The Cybersecurity Directory

Back to search results

Okta Logo in Blue

The leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organisations to securely connect the right people to the right technologies at the right time.

With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 9,400 organizations, including Engie, JetBlue, Nordstrom, Takeda Pharmaceutical, Teach for America, T-Mobile and Twilio, trust Okta to help protect the identities of their workforces and customers.

Main office address

20 Farringdon Rd

Telephone number

+44 203 389 8779


Key Products / Services / Sectors (USPs)

Okta Identity cloud is a solution that is helping government organisations deploy new security tools and authentication options as soon as they become available. 

Identity and access management gives such organisations the freedom to focus on building the service they want to provide to employees, partners and citizens, while benefiting from the vendor’s security and identity expertise. 

Centralise identity

Managing multiple passwords is hard. Managing multiple good, non-repetitive passwords is even harder. Reduce password management risk by centralising identity with single sign-on so you can ensure the passwords you do use are as strong as possible.

Enable strong authentication

Passwords have inherent limitations. Strengthen identity assurance with a variety of multi-factor authentication methods including one-time-passwords, soft or physical tokens, or even biometrics. Apply and manage these policies to all applications so you protect your data no matter where or how people access it.  Contextual or Risk based authentication in conjunction with machine learning strenghten these characteristics even further. API access management protects modern application architectures using OAuth.

Reduce attack surface

Not knowing who has access to what can leave you with security blindspots, especially if employees change roles or leave. Proper lifecycle management eliminates these gaps by reducing possible attacker entry points – plus it simplifies provisioning and deprovisioning.

Enable visibility and response

Security shouldn’t be restricted to silos. With identity as the modern perimeter, it’s essential for authentication data to be available across security systems to provide complete visibility. This gives you the opportunity to correlate seemingly disparate events, identify possible threats, and take action faster.

The Okta Identity Cloud platform itself offers some of the highest levels of security compliance in the industry.


Backup and disaster recovery

Backup solutions

Incident response

Disaster recovery solutions

Disaster Recovery as a Service (DRaaS)

Penetration testing

Vulnerability scanning

Automated test tools

Web app PEN tests

Mobile app/IoT PEN tests

Social engineering PEN tests

Red Teams

Cybersecurity awareness training programs

On-site training programs

Online training

Interactive training videos


Automated phishing simulations

Cybersecurity consultancy

Compliance assistance

Security assessment, policy help, strategic advise

Information risk assessment

Privacy Impact Assessment services

Security architecture

Digital forensics and investigation services

Security and data protection audit

Network security

Data Loss Prevention (DLP)

Distributed denial of service (DDoS) prevention

Email security

Firewalls and web access firewalls (WAF)

Network segmentation

Security information and event management (SIEM)

Other intrusion detection (Machine Learning / AI based)

Endpoint security solutions

Mobile security


IoT security

Endpoint Detection and Response (EDR)

Network infrastructure controls, e.g. Firewalls, switches, security policy enforcement


URL filters

Security email gateway


Print management and security

Threat intelligence monitoring and detection

Consultancy and advice

User and Entity Behavior Analytics (UEBA)

Security information and event management (SIEM)

Network Traffic Analysis Framework

Web Proxy

Cybersecurity Platform

Phishing detection

Fraud detection

Rogue or Fake Mobile App Detection

Surface, “Deep” and “Dark” Web Monitoring

Social media monitoring

Brand Monitoring

Managed security services (MSSP)

Protective monitoring

Incident response

Vulnerability management

Threat management

Telco security

Security help desk and support

Staff training

Identity and access management

Identity provisioning (IDP)

Data verification

Data orchestration services

Identity hub

Authentication (credential) of citizens

Authentication (credential) of employees and other internal persons

Anti-fraud services, e.g. behavioural monitoring

Attribute provisioning and verification

Identity networks

Identity apps

Privacy and consent management

Privileged access management (PAM)








Main point of contact

Name: Jason Le-May


Phone: +44 203 389 8779