SlideShare a Scribd company logo
1 of 24
Download to read offline
How Five Major Companies Use IAM
Okta Inc.
301 Brannan St
San Francisco
CA 94107
info@okta.com
1 888 722 7871
IAM Has Become
a Competitive Advantage
Companies looking
to stay ahead of the
competition realize
they need to modernize
their IT and meet new
customer demands.
A major part of this
modernization is
improved identity and
access management
(IAM) —Companies need
to find better ways to
offer simple yet secure
access to all users.
The lines between
employee, partner,
and customer identity
solutions are blurring,
which is forcing
companies to rethink IAM.
For this reason, some
of the biggest global
organizations
are turning to Okta.
Leading
Companies
Use Okta
These Top Companies Are
Leveraging Okta Solutions
to Address IAM Needs
Mobile and digital collaboration began
to break the perimeter model, and then
the cloud transformation had the same
effect. Those two forces really forced
us to come to a reckoning, which is that
our whole security model needs to shift
to recognize that our previous planes
for security are no longer effective.
21st Century Fox
Taking a Zero Trust Approach
With 30,000 full-time employees, up to 50,000
partners, and over 1.8 billion subscribers across
six continents, 21st Century Fox is one of the
world’s biggest media conglomerates.
Melody Hildebrandt
21st Century Fox Global CISO
Challenge
Keeping a Global User Base Secure
21st Century Fox’s affiliates
include content creators
that collaborate with third
parties across numerous
devices and touchpoints,
destabilizing and ultimately
dispersing the conventional
network perimeter.
Responsible for immense
stores of proprietary
content, 21st Century Fox
simply couldn’t tolerate the
possibility of a data breach.
With 81% of data breaches
caused by weak and
stolen credentials, the
organization needed
more than the traditional
username and password
to authenticate users.
Solution
A Zero Trust Approach With MFA
With Okta’s help, 21st
Century Fox took
a proactive Zero
Trust approach to
maintaining security.
The company deployed
the Okta Identity Cloud to
employees and partners,
with Adaptive Multi-Factor
Authentication (MFA)
being a key component.
All access requests are
now quickly vetted against
a range of contextual
variables, including user
identity, app, device,
location, and network.
A range of authentication
factors, including
YubiKey, Okta Verify
with Push, Voice, SMS,
and U2F tokens were
incorporated into the
MFA solution.
30,000
full-time staff
members offered
secure access
7
ways to validate a
second factor
Results by the Numbers
50,000+
extended company
partners enrolled in
Okta Adaptive MFA
Cardinal Health
A Superior User Experience
Cardinal Health is a Fortune Global 500
company that provides medical products and
services to customers all over the world.
Bill Dubois
Cardinal Health IAM Build  Strategy Manager
Customers want to make informed
decisions around what they’re
doing with their healthcare. They
want to rate the services that
they’re getting … So, we need to
make all of our services much more
consumer-friendly.
Challenge
Finding a Refined and Scalable IAM Solution
Over the years, Cardinal
Health had built its own
legacy IAM solution.
The existing IAM
solution did not provide
the security and user
experience Cardinal
Health wanted to offer its
customers.
As the company grew
from 35,000 to 60,000
employees—and doubled
its number of IAM
integrations—it became
clear that this custom
solution needed to be
replaced with a more
effective system for both
internal and external users.
The legacy system placed
pressure on internal IT
teams that had to keep the
system updated and deal
with service and password
reset requests.
Solution
Simple and Secure Authentication For All Users
Cardinal Health partnered
with Okta to roll out an
ambitious new IAM
platform that offered a
better login experience,
self-service password
recovery, and account
unlock capabilities with
authentication factors
such as SMS, voice, and
secondary email.
Existing legacy applications
were migrated to Okta. All
apps are now standards-
based and customizations
were eliminated.
The new solution was
deployed globally,
launching simultaneously
in 12 languages.
111
legacy applications
migrated to Okta in a
single weekend
60,000+
global users moved
all at once
Results by the Numbers
40,000+
users accessing
the system in the
first week alone
Adobe
Transforming its Business Model
The goal with Okta is we want to have
the user experience be that you log
in once, and once you’ve logged in,
that you can access other applications
without having to authenticate again.
Adobe leads the way in developing and
deploying digital marketing and media solutions,
including popular apps like Photoshop and
Premiere Pro.
Den Jones
Director of Enterprise Security
Challenge
Getting Thousands of Users to the Cloud
After moving its product
offerings to the cloud,
Adobe’s business model
was transformed and it
had to adjust its identity
and access needs.
That meant creating
federated connections
between its services
and millions of
customers worldwide.
It also meant designing
an internal identity
management platform
that could support
continuous integrations
with hundreds of apps.
These are time-consuming
tasks that would prevent
both Adobe’s IT and
product development
teams from focusing on
core needs of the company.
Solution
One Identity Platform for All Users
Okta became the
identity management
layer for thousands
of Adobe Cloud’s
enterprise customers.
Adobe engineers can
integrate Okta functionality
into their existing code,
while keeping the Adobe-
branded login experience.
Okta also secures
Adobe employee
access to cloud apps.
Adobe’s IT team
successfully migrated 300
apps to the new platform
in less than three months,
including Office 365.
Thousands
of companies making
use of Okta to access
Adobe Creative Cloud
for enterprise
Results by the Numbers
25,000+
Adobe employees using
Okta Single Sign-On
(SSO) to access 300+
enterprise apps
9
months to deliver
enterprise-ready
authentication that was
fully integrated with the
Adobe Creative Cloud
Con Edison
Securing Backend Systems
Con Edison is an energy and utilities company
that supplies electricity, gas, and steam to more
than 3.5 million customers across New York
City and Westchester County.
We have other third parties who we
want to give our data to, and they
don’t need to necessarily go through
the UI to get to the service layer. So
how are we going to protect them
from all the applications, from all the
data, to make sure they only have
their rights that they need?
Jennifer Moy
Con Edison IT Lead
Challenge
Managing API Access
To provide customers with
a seamless and integrated
user experience, Con
Edison was making use
of multiple vendors that
needed to touch company
APIs and access data.
While this made life easier
for users, it also meant that
managing backend access
was difficult.
Since APIs are becoming
a popular attack vector,
and the organization held
sensitive customer data,
Con Edison realized that
it needed a solution that
would improve the way
it managed access.
Solution
Secure API Access Management
By leveraging Okta’s
API Access Management
solution, Con Edison was
able to regain control
of backend systems.
The solution provided
built-in security for all API
endpoints, with protection
for digital channels,
source systems on the
backend, and the entire
service layer.
Okta enabled company
IT to control access at
a granular level, examining
the policies, scopes,
rules, and claims for every
application and user.
1 million
active users
15 million
API requests a month
Results by the Numbers
1
identity-driven policy
engine with Okta API
Access Management
Nasdaq
Seeking a Consolidated Experience
Nasdaq provides trading, clearing, exchange
technology, listing, information, and public
company services across 85 marketplaces and
50 countries.
Whenever you do something
manually, you add a component of
error. From a risk perspective, it was
complex. From a user perspective,
that risk was even worse because
people had to remember multiple
passwords and credentials.
Bharat Patel
Nasdaq Vice President of Corporate Infrastructure
Challenge
Taking Control of Identity
Comprehensive
security and regulatory
compliance were major
priorities for Nasdaq.
The organization’s
legacy identity solution
depended on manual
processes that were
prone to error and
ill-equipped to manage
thousands of users.
Existing authentication
caused login friction and
bad password habits that
frustrated users and
introduced security risks.
Solution
Better Security and Usability Through SSO
Okta unified all of Nasdaq’s
apps and solutions.
The login process was
streamlined through a
company-wide rollout of
Okta SSO.
The Okta Identity Cloud
added a powerful
security layer to ensure
that credentials would
not be compromised.
Any app Nasdaq onboards
now has to have Okta as
its identity access source.
5,000+
employees and
contractors use Okta to
access internal apps
Results by the Numbers
25
apps integrated into
the platform
15
minutes to integrate
an application
What Can Okta
Do For You?
Contact our team to learn how
our IAM solutions can help
secure your data and give users
a better login experience.
Okta Inc.
301 Brannan St
San Francisco
CA 94107
info@okta.com
1 888 722 7871

More Related Content

What's hot

DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319Martin Sandren
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsVignesh Ganesan I Microsoft MVP
 
Azure conditional access
Azure conditional accessAzure conditional access
Azure conditional accessTad Yoke
 
Protecting Your Data- AWS Security Tools and Features
Protecting Your Data- AWS Security Tools and FeaturesProtecting Your Data- AWS Security Tools and Features
Protecting Your Data- AWS Security Tools and FeaturesAmazon Web Services
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Hands-on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3
Hands-on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3Hands-on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3
Hands-on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3Amazon Web Services
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityAlbert Hoitingh
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 
AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview Amazon Web Services
 

What's hot (20)

DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319DI Amsterdam meetup windows hello core slides 20200319
DI Amsterdam meetup windows hello core slides 20200319
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Cost Optimization on AWS
Cost Optimization on AWSCost Optimization on AWS
Cost Optimization on AWS
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Azure conditional access
Azure conditional accessAzure conditional access
Azure conditional access
 
Protecting Your Data- AWS Security Tools and Features
Protecting Your Data- AWS Security Tools and FeaturesProtecting Your Data- AWS Security Tools and Features
Protecting Your Data- AWS Security Tools and Features
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Understanding Azure AD
Understanding Azure ADUnderstanding Azure AD
Understanding Azure AD
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Hands-on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3
Hands-on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3Hands-on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3
Hands-on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Microsoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App SecurityMicrosoft 365 and Microsoft Cloud App Security
Microsoft 365 and Microsoft Cloud App Security
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview AWS Identity, Directory, and Access Services: An Overview
AWS Identity, Directory, and Access Services: An Overview
 

Similar to 5 Top Enterprises Making IAM a Priority

ca-and-microsoft-are-collaborating-to-enable-the-iot-driven-application-economy
ca-and-microsoft-are-collaborating-to-enable-the-iot-driven-application-economyca-and-microsoft-are-collaborating-to-enable-the-iot-driven-application-economy
ca-and-microsoft-are-collaborating-to-enable-the-iot-driven-application-economyDoug Antaya
 
[Infographic] Cloud Integration Drivers and Requirements in 2015
[Infographic] Cloud Integration Drivers and Requirements in 2015[Infographic] Cloud Integration Drivers and Requirements in 2015
[Infographic] Cloud Integration Drivers and Requirements in 2015SnapLogic
 
Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram Sandeep Kumar Seeram
 
Mobile App Development Service for Idea Cellular | Success Story
Mobile App Development Service for Idea Cellular | Success StoryMobile App Development Service for Idea Cellular | Success Story
Mobile App Development Service for Idea Cellular | Success StoryiProgrammer Solutions
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...SaaStock
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeCapgemini
 
Business in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology TrendsBusiness in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology TrendsSoftClouds LLC
 
TBytes Agile & AI Operations
TBytes Agile & AI OperationsTBytes Agile & AI Operations
TBytes Agile & AI OperationsEGBG Services
 
The 10 Most Scalable Cloud Solution Providers of 2019
The 10 Most Scalable Cloud Solution Providers of 2019The 10 Most Scalable Cloud Solution Providers of 2019
The 10 Most Scalable Cloud Solution Providers of 2019Mirror Review
 
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.Reduced revenue leakage stemming from piracy for a Fortune 500 software major.
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.Mindtree Ltd.
 
How do biotech firms leverage Boomi for Master Data Management
How do biotech firms leverage Boomi for Master Data ManagementHow do biotech firms leverage Boomi for Master Data Management
How do biotech firms leverage Boomi for Master Data ManagementRay Business Technologies
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
Top 10 Digital Transformation Trends For Business
Top 10 Digital Transformation Trends For BusinessTop 10 Digital Transformation Trends For Business
Top 10 Digital Transformation Trends For BusinessAlbiorix Technology
 

Similar to 5 Top Enterprises Making IAM a Priority (20)

ca-and-microsoft-are-collaborating-to-enable-the-iot-driven-application-economy
ca-and-microsoft-are-collaborating-to-enable-the-iot-driven-application-economyca-and-microsoft-are-collaborating-to-enable-the-iot-driven-application-economy
ca-and-microsoft-are-collaborating-to-enable-the-iot-driven-application-economy
 
[Infographic] Cloud Integration Drivers and Requirements in 2015
[Infographic] Cloud Integration Drivers and Requirements in 2015[Infographic] Cloud Integration Drivers and Requirements in 2015
[Infographic] Cloud Integration Drivers and Requirements in 2015
 
Saa sure
Saa sureSaa sure
Saa sure
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram
 
Mobile App Development Service for Idea Cellular | Success Story
Mobile App Development Service for Idea Cellular | Success StoryMobile App Development Service for Idea Cellular | Success Story
Mobile App Development Service for Idea Cellular | Success Story
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...
 
A Microsoft Approach to Cloud Computing
A Microsoft Approach to Cloud ComputingA Microsoft Approach to Cloud Computing
A Microsoft Approach to Cloud Computing
 
3i Infotech Case Study
3i Infotech Case Study3i Infotech Case Study
3i Infotech Case Study
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
Business in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology TrendsBusiness in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology Trends
 
TBytes Agile & AI Operations
TBytes Agile & AI OperationsTBytes Agile & AI Operations
TBytes Agile & AI Operations
 
The 10 Most Scalable Cloud Solution Providers of 2019
The 10 Most Scalable Cloud Solution Providers of 2019The 10 Most Scalable Cloud Solution Providers of 2019
The 10 Most Scalable Cloud Solution Providers of 2019
 
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.Reduced revenue leakage stemming from piracy for a Fortune 500 software major.
Reduced revenue leakage stemming from piracy for a Fortune 500 software major.
 
Redington Value Journal - March 2018
Redington Value Journal - March 2018Redington Value Journal - March 2018
Redington Value Journal - March 2018
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 
How do biotech firms leverage Boomi for Master Data Management
How do biotech firms leverage Boomi for Master Data ManagementHow do biotech firms leverage Boomi for Master Data Management
How do biotech firms leverage Boomi for Master Data Management
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Top 10 Digital Transformation Trends For Business
Top 10 Digital Transformation Trends For BusinessTop 10 Digital Transformation Trends For Business
Top 10 Digital Transformation Trends For Business
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

5 Top Enterprises Making IAM a Priority

  • 1. How Five Major Companies Use IAM Okta Inc. 301 Brannan St San Francisco CA 94107 info@okta.com 1 888 722 7871
  • 2. IAM Has Become a Competitive Advantage Companies looking to stay ahead of the competition realize they need to modernize their IT and meet new customer demands. A major part of this modernization is improved identity and access management (IAM) —Companies need to find better ways to offer simple yet secure access to all users. The lines between employee, partner, and customer identity solutions are blurring, which is forcing companies to rethink IAM. For this reason, some of the biggest global organizations are turning to Okta.
  • 3. Leading Companies Use Okta These Top Companies Are Leveraging Okta Solutions to Address IAM Needs
  • 4. Mobile and digital collaboration began to break the perimeter model, and then the cloud transformation had the same effect. Those two forces really forced us to come to a reckoning, which is that our whole security model needs to shift to recognize that our previous planes for security are no longer effective. 21st Century Fox Taking a Zero Trust Approach With 30,000 full-time employees, up to 50,000 partners, and over 1.8 billion subscribers across six continents, 21st Century Fox is one of the world’s biggest media conglomerates. Melody Hildebrandt 21st Century Fox Global CISO
  • 5. Challenge Keeping a Global User Base Secure 21st Century Fox’s affiliates include content creators that collaborate with third parties across numerous devices and touchpoints, destabilizing and ultimately dispersing the conventional network perimeter. Responsible for immense stores of proprietary content, 21st Century Fox simply couldn’t tolerate the possibility of a data breach. With 81% of data breaches caused by weak and stolen credentials, the organization needed more than the traditional username and password to authenticate users.
  • 6. Solution A Zero Trust Approach With MFA With Okta’s help, 21st Century Fox took a proactive Zero Trust approach to maintaining security. The company deployed the Okta Identity Cloud to employees and partners, with Adaptive Multi-Factor Authentication (MFA) being a key component. All access requests are now quickly vetted against a range of contextual variables, including user identity, app, device, location, and network. A range of authentication factors, including YubiKey, Okta Verify with Push, Voice, SMS, and U2F tokens were incorporated into the MFA solution.
  • 7. 30,000 full-time staff members offered secure access 7 ways to validate a second factor Results by the Numbers 50,000+ extended company partners enrolled in Okta Adaptive MFA
  • 8. Cardinal Health A Superior User Experience Cardinal Health is a Fortune Global 500 company that provides medical products and services to customers all over the world. Bill Dubois Cardinal Health IAM Build Strategy Manager Customers want to make informed decisions around what they’re doing with their healthcare. They want to rate the services that they’re getting … So, we need to make all of our services much more consumer-friendly.
  • 9. Challenge Finding a Refined and Scalable IAM Solution Over the years, Cardinal Health had built its own legacy IAM solution. The existing IAM solution did not provide the security and user experience Cardinal Health wanted to offer its customers. As the company grew from 35,000 to 60,000 employees—and doubled its number of IAM integrations—it became clear that this custom solution needed to be replaced with a more effective system for both internal and external users. The legacy system placed pressure on internal IT teams that had to keep the system updated and deal with service and password reset requests.
  • 10. Solution Simple and Secure Authentication For All Users Cardinal Health partnered with Okta to roll out an ambitious new IAM platform that offered a better login experience, self-service password recovery, and account unlock capabilities with authentication factors such as SMS, voice, and secondary email. Existing legacy applications were migrated to Okta. All apps are now standards- based and customizations were eliminated. The new solution was deployed globally, launching simultaneously in 12 languages.
  • 11. 111 legacy applications migrated to Okta in a single weekend 60,000+ global users moved all at once Results by the Numbers 40,000+ users accessing the system in the first week alone
  • 12. Adobe Transforming its Business Model The goal with Okta is we want to have the user experience be that you log in once, and once you’ve logged in, that you can access other applications without having to authenticate again. Adobe leads the way in developing and deploying digital marketing and media solutions, including popular apps like Photoshop and Premiere Pro. Den Jones Director of Enterprise Security
  • 13. Challenge Getting Thousands of Users to the Cloud After moving its product offerings to the cloud, Adobe’s business model was transformed and it had to adjust its identity and access needs. That meant creating federated connections between its services and millions of customers worldwide. It also meant designing an internal identity management platform that could support continuous integrations with hundreds of apps. These are time-consuming tasks that would prevent both Adobe’s IT and product development teams from focusing on core needs of the company.
  • 14. Solution One Identity Platform for All Users Okta became the identity management layer for thousands of Adobe Cloud’s enterprise customers. Adobe engineers can integrate Okta functionality into their existing code, while keeping the Adobe- branded login experience. Okta also secures Adobe employee access to cloud apps. Adobe’s IT team successfully migrated 300 apps to the new platform in less than three months, including Office 365.
  • 15. Thousands of companies making use of Okta to access Adobe Creative Cloud for enterprise Results by the Numbers 25,000+ Adobe employees using Okta Single Sign-On (SSO) to access 300+ enterprise apps 9 months to deliver enterprise-ready authentication that was fully integrated with the Adobe Creative Cloud
  • 16. Con Edison Securing Backend Systems Con Edison is an energy and utilities company that supplies electricity, gas, and steam to more than 3.5 million customers across New York City and Westchester County. We have other third parties who we want to give our data to, and they don’t need to necessarily go through the UI to get to the service layer. So how are we going to protect them from all the applications, from all the data, to make sure they only have their rights that they need? Jennifer Moy Con Edison IT Lead
  • 17. Challenge Managing API Access To provide customers with a seamless and integrated user experience, Con Edison was making use of multiple vendors that needed to touch company APIs and access data. While this made life easier for users, it also meant that managing backend access was difficult. Since APIs are becoming a popular attack vector, and the organization held sensitive customer data, Con Edison realized that it needed a solution that would improve the way it managed access.
  • 18. Solution Secure API Access Management By leveraging Okta’s API Access Management solution, Con Edison was able to regain control of backend systems. The solution provided built-in security for all API endpoints, with protection for digital channels, source systems on the backend, and the entire service layer. Okta enabled company IT to control access at a granular level, examining the policies, scopes, rules, and claims for every application and user.
  • 19. 1 million active users 15 million API requests a month Results by the Numbers 1 identity-driven policy engine with Okta API Access Management
  • 20. Nasdaq Seeking a Consolidated Experience Nasdaq provides trading, clearing, exchange technology, listing, information, and public company services across 85 marketplaces and 50 countries. Whenever you do something manually, you add a component of error. From a risk perspective, it was complex. From a user perspective, that risk was even worse because people had to remember multiple passwords and credentials. Bharat Patel Nasdaq Vice President of Corporate Infrastructure
  • 21. Challenge Taking Control of Identity Comprehensive security and regulatory compliance were major priorities for Nasdaq. The organization’s legacy identity solution depended on manual processes that were prone to error and ill-equipped to manage thousands of users. Existing authentication caused login friction and bad password habits that frustrated users and introduced security risks.
  • 22. Solution Better Security and Usability Through SSO Okta unified all of Nasdaq’s apps and solutions. The login process was streamlined through a company-wide rollout of Okta SSO. The Okta Identity Cloud added a powerful security layer to ensure that credentials would not be compromised. Any app Nasdaq onboards now has to have Okta as its identity access source.
  • 23. 5,000+ employees and contractors use Okta to access internal apps Results by the Numbers 25 apps integrated into the platform 15 minutes to integrate an application
  • 24. What Can Okta Do For You? Contact our team to learn how our IAM solutions can help secure your data and give users a better login experience. Okta Inc. 301 Brannan St San Francisco CA 94107 info@okta.com 1 888 722 7871