Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      In-House vs Outsourcing for React.js Development: Understand What Is Best for Your Enterprise

      July 17, 2025

      Tiny Screens, Big Impact: The Forgotten Art Of Developing Web Apps For Feature Phones

      July 16, 2025

      Kong AI Gateway 3.11 introduces new method for reducing token costs

      July 16, 2025

      Native vs hybrid vs cross-platform: Resolving the trilemma

      July 16, 2025

      Google will announce its next lineup of Pixels on August 20 – Here’s what we know

      July 17, 2025

      Is HR ready for AI?

      July 17, 2025

      Shopping for a new work laptop? This lightweight LG Gram is on sale for $1,000 off – but hurry!

      July 17, 2025

      Marshall’s first soundbar rocks as a mainstream alternative – Here’s my take

      July 17, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 17, 2025
      Recent

      The details of TC39’s last meeting

      July 17, 2025

      Vector Search Embeddings and RAG

      July 16, 2025

      Python Meets Power Automate: Trigger via URL

      July 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      How to Edit Videos in Windows 10 in 5 Steps

      July 17, 2025
      Recent

      How to Edit Videos in Windows 10 in 5 Steps

      July 17, 2025

      CPU Temperature Monitor for Windows 10 (Free Tools & Tips)

      July 17, 2025

      Firefox 141 Finally Brings WebGPU Support on Windows

      July 17, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Tech & Work»New Okta Platform innovations extend Identity Security Fabric to non-human identities in an agentic AI future

    New Okta Platform innovations extend Identity Security Fabric to non-human identities in an agentic AI future

    April 9, 2025

    Okta, Inc. (NASDAQ: OKTA), the leading independent Identity partner, today announced new Okta Platform capabilities to help businesses secure AI agents and other non-human identities with the same level of visibility, control, governance, and automation as human ones. The Okta Platform will now bring a unified, end-to-end identity security fabric to organizations for managing and securing all types of identities across their ecosystem, from AI agents to API keys to employees.

    Why it Matters:

    • The number of non-human identities is set to grow exponentially, with Deloitte¹ forecasting that by 2027, half of all companies using GenAI will also adopt agents in some capacity. Some companies have already begun deploying hundreds of AI-SDRs and thousands of customer service agents.
    • Non-human identities (i.e., service accounts, shared accounts, break-glass identities, API keys, access tokens, and automation tools) are inherently difficult to secure because they are often non-federated, lack MFA, and have static credentials that aren’t regularly rotated. These factors, combined with excessive privileges and a high blast radius, create an attractive attack vector for adversaries.
    • Last year, only 15% of organizations² said they remain confident in their ability to secure them.
    • With more types of identities, machines, and agents trying to access increasingly critical data and resources, across larger numbers of devices, organizations will be faced with managing this added complexity and identity sprawl.
    • Now more than ever, organizations will need to implement an identity security fabric, which is defined as a unified framework for securing, managing, and governing both non-human and human identities across ecosystems at scale.

    “Amid the excitement of embracing the next wave of generative AI, companies are moving quickly to deploy agentic use cases, often overlooking the critical need to secure these systems and control the sprawl of non-human identities,” said Arnab Bose, Chief Product Officer, Okta Platform at Okta. “By bringing these identities into the identity security fabric, the Okta Platform can help organizations secure the rising digital labor force with the same rigor and vigilance as the human workforce.”

    Comprehensive Identity Security Capabilities for Managing Every Type of Identity

    The rapid adoption of cloud services, SaaS applications, remote work, and now the rise of non-human identities has transformed the security landscape. Homogenous tech stacks don’t exist, and would present their own set of security risks.

    This fragmentation creates complexity, gaps in security tools, and an expanded attack surface, making it harder for security teams to maintain a holistic view of their security posture. An extensible identity security fabric enables organizations to build best-in-breed stacks and connect disparate security tools across the enterprise. However, to be effective, companies need the right identity tools, including posture management, threat protection, privileged access, governance, device access, and more.

    With new and enhanced Okta Platform capabilities, organizations can have more comprehensive security for all identities—human and non-human—with solutions that are seamlessly interconnected and fully integrated across the business.

    What’s New –  Identity Security Posture Management and Okta Privileged Access

    New capabilities for Identity Security Posture Management and Okta Privileged Access, provide companies with a comprehensive, end-to-end solution for protecting AI agents and other non-human identities, including service accounts, shared accounts, break-glass identities, API keys, access tokens, and automation tools.

    Organizations can better discover, secure, and manage non-human identities, while ensuring AI-driven automation and machine-to-machine interactions remain governed under Zero Trust policies. These tools also continuously monitor NHI risks and vulnerabilities.

    What’s New  – Separation of Duties

    Available today for customers in GA preview, Separation of Duties (SoD) in Okta Identity Governance (OIG) helps ensure that users do not accumulate conflicting access permissions that could introduce security risks or compliance violations. By enforcing SoD policies based on pre-defined business rules, SoD helps organizations prevent fraud, maintain regulatory compliance, and reduce the risk of insider threats.

    What’s New – Secure Device Features

    Available today for customers in Early Access, Okta is releasing new Secure Device Features under Okta Device Access and Adaptive MFA that minimize MFA fatigue and the risk of credential theft by seamlessly integrating device context and hardware protection for Zero Trust access control. These features integrate with the customer’s ecosystem of tools to gather signals that inform access policies and continuous risk assessment and enforcement.

    Protecting Identities, Across Every Application and Environment

    Since no enterprise today has a fully homogeneous tech stack, organizations need deep and secure identity integrations into every single application they use. This approach unifies user context, resources, policies and risk signals across infrastructure, apps, APIs, and more regardless of the identity types.

    What’s New – Secure Identity Integrations (SII)

    Generally available today for customers, Okta Secure Identity Integrations provide an unprecedented level of comprehensive, out-of-the-box security integrations for the most business-critical applications. Now available as a collection in the Okta Integration Network, companies can quickly configure deep integrations for applications, like Google Workspace, Microsoft 365, and Salesforce, that go beyond SSO and lifecycle management to manage user privileges, uncover hidden risks, and rapidly contain threats with built-in remediation and universal logout.

    Other New Innovations:

    • On-prem Connector: Available today for customers in Early Access, Okta On-prem Connector is a new out-of-the-box connector that allows customers to integrate their on-premises apps with Okta Identity Governance, enabling the discovery, visibility, and management of fine-grained application entitlements within Okta.

    ¹Autonomous generative AI agents: Under development, Deloitte, November 19, 2024.

    ²CSA and Astrix Research: The State of Non-Human Identity Security, Cloud Security Alliance and Astrix, September 12, 2024.

    The post New Okta Platform innovations extend Identity Security Fabric to non-human identities in an agentic AI future appeared first on SD Times.

    Source: Read More 

    news
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleLovable AI Found Most Vulnerable to VibeScamming — Enabling Anyone to Build Live Scam Pages
    Next Article Google goes all in on agent development, Gemini at Google Cloud Next 25

    Related Posts

    Tech & Work

    In-House vs Outsourcing for React.js Development: Understand What Is Best for Your Enterprise

    July 17, 2025
    Tech & Work

    Tiny Screens, Big Impact: The Forgotten Art Of Developing Web Apps For Feature Phones

    July 16, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    LLMs factor in unrelated information when recommending medical treatments

    Artificial Intelligence

    Create a unit testing framework for PostgreSQL using the pgTAP extension

    Databases

    CSS @media Rule Explained

    Web Development

    CommVQ: Commutative Vector Quantization for KV Cache Compression

    Machine Learning

    Highlights

    CVE-2025-5815 – WordPress Traffic Monitor Unauthenticated Data Modification Vulnerability

    June 13, 2025

    CVE ID : CVE-2025-5815

    Published : June 13, 2025, 4:15 a.m. | 1 hour, 48 minutes ago

    Description : The Traffic Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the tfcm_maybe_set_bot_flags() function in all versions up to, and including, 3.2.2. This makes it possible for unauthenticated attackers to disabled bot logging.

    Severity: 5.3 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-47114 – Adobe Experience Manager Stored Cross-Site Scripting Vulnerability

    June 10, 2025

    New Calendar app for Windows 11 is here, but not for everyone

    May 17, 2025

    nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery

    June 25, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.