SlideShare a Scribd company logo
Company and Market Overview
Identity and Okta
Enterprise Identity, Delivered
okta confidential 2
Applications Devices
People
Applications
Devices
People
Identity
Applications
Devices
People
+ Custom, + Cloud, + Mobile
Applications Devices
People
+ iPhone, Android, + iPad
+ Remote, + Partners, + Customers
Identity
Pain for end users
Pain for IT
Time consuming
user provisioning
?
Pain for Security Team
All Your Devices
All Your People
Desktop, Laptops,
Tablets, Smartphones,
Employees, Customers,
Partners, Contractors
Mobile
On Prem
Cloud
On Prem Identity
LDAP
okta confidential 13
All Your Devices
All Your People
Desktop, Laptops,
Tablets, Smartphones,
Employees, Customers,
Partners, Contractors
Mobile
On Prem
Cloud
On Prem Identity
LDAP
All Your Devices
All Your People
Desktop, Laptops,
Tablets, Smartphones,
Employees, Customers,
Partners, Contractors
Mobile
On Prem
Cloud
On Prem Identity
LDAP
Strengthen Security
Increase Productivity
Reduce IT Costs
3,300 users | 100 apps
“Cloud IAM is the best option, providing
310% ROI over manual processes”
- Forrester Research, October 2012
> $10M
savings
Okta was named a Leader (highest ranking)
Legacy IdM Solutions Have Not Delivered
okta confidential 18
ApplicationsUsers
Employees,
One Desktop
On Premises
•  On Prem Apps
•  Desktop Access
•  VPN Control Point
Well Defined
Problem1
•  Multi-year $2-$5M TCO
•  Services, 4-5x licenses
•  HW, SW, Integrations
Expensive SW, and
Deployments2
•  Connector Treadmill
•  Forklift Upgrades
•  Labor Intensive
Costly Ongoing
Maintenance3
Identity Strategies are Facing a Fundamental Choice
okta confidential 19
“Cloud IAM Has Superior ROI”
“Cloud IAM is the best option; 310% ROI over manual
processes, 90% reduction of operations vs. on-prem solutions.”
“By the end of 2015, IDaaS will
account for 40% of all new IAM sales”
•  HW, SW, Infrastructure
•  Services Intense
•  Connector Treadmill
•  Forklift Upgrades
•  Service
•  Enterprise Grade
•  Integrated
•  Future Proof
•  Easy to Use
Connecting People to Apps: Anywhere, Anytime, Any Device
okta confidential 20
All Your Devices
All Your People
Desktop, Laptops,
Tablets, Smartphones,
Employees, Customers,
Partners, Contractors
Mobile
On Prem
Cloud
On Prem Identity
LDAP
SSO, Integrated MFA
• Any Device, Any App
Provisioning & Deprovisioning
• Workflow, Audit, Self Service
Centralized Admin & Reporting
• Policy, Compliance, Analytics
Robust On Prem Integration
• Directories, Identity Mgmt, Apps
okta confidential 21
-  Business & Consumer Apps
-  Deep Integrations
-  Continually Monitored
-  Constantly Expanding
1000’s of Apps, All Pre-Integrated
A Secure, Reliable and Up-to-Date Service
-  Highly redundant service footprint
-  Eight AWS Availability Zones
-  Two geographic regions (VA and OR)
-  Near perfect availability in 2012
-  527,040min uptime, 2min of downtime
-  www.okta.com/trust
-  SOC2 Type II audited
-  Across all 5 Trust Principles
-  Dedicated Tech Ops team
-  SixApart, Cisco, IronPort, Zynga,
MediaTemple, Hotwire, Qwest, CollabNet
-  48 feature releases annually
okta confidential 22
Deployment Architecture – Highly Redundant
okta confidential 23
1 2
DC 1DC 2
Proxy Load
Balancers
App Servers
Databases
1 2 3 4 5
okta.com
okta-admin.com
Internet
Anycast
DNS
3
One Service, Addresses Two Identity Problems
okta confidential 24
Remote/Mobile
Employees
Employees
Identity Management for
Internal Employees
Customers/
Partners
Identity Management for
Customer & Partner Portals
Okta for Portals Collaboration
Helpdesk
Product
Customer or Partner Network
Product
Quote & Order
Processing
•  Easy to use
•  Cloud Service
•  Comprehensive
•  Secure
Register once
Login once
Individual Users or
Partner Networks
1
2
3
Market Leader in Identity & Access Management
•  All Users, Devices & Apps
•  SSO, Strong Authentication, Provisioning, Analytics
•  Thousands of Pre-integrated Applications
•  Integrates and Extends Legacy Identity Infrastructure
Modern Identity
Service
Enterprise Service
and
Support
•  Zero Downtime Service Architecture
•  Professional Services Team with Deep Identity Background
•  24 / 7 / 365 Support
Veteran
Team
“Okta makes our problems their
own and it’s why we can rely on
them to make us successful.”
“Gatwick Airport never shuts down, and we expect the
same from our partners. Okta's enterprise-grade
service was the only solution that could meet our
technical, operational and security requirements.”
okta confidential 26
Applications and the Cloud
A Changing Landscape
okta confidential 27
okta confidential 28
The cloud is delivering real benefits now
okta confidential 29
The cloud is only going to get more effective
March 2013
Announcing New Lower Pricing for Amazon EC2
“…today’s price drop represents
the 26th price drop for AWS”
okta confidential 30
33%
Growth
250%
Growth
100%
Growth
500%
Growth
800%
Growth
okta confidential 31
okta confidential 32
okta confidential 33
Mobility
The Stunning Disruption of the PC
okta confidential 34
okta confidential 35
Source: asymco
okta confidential 36
Source: asymco
okta confidential 37
okta confidential 39
Managing External Identities
Connecting Customers and Partners to your Business
okta confidential 40
What is a Portal?
Partners
Employees
Customers
MyCo portal
account
support
shipping
Account
app
Support
app
Shipping
app
•  Where you conduct business online
•  Your services
•  Partner management
•  Customer support
•  Customers, partners, employees
Portals – company to company collaboration increasing
okta confidential 42
B2E
e.g. Sharepoint
Knowledge portals
Dashboards
Next-gen intranets
B2C
E-business portals
Constituent portals
B2B
Supplier portals
Distributor portals
2007
60%
25%
15%
2013source: Gartner
B2C
Tied to revenue
“Ease of Use” is critical
New - built from cloud
apps
B2E
e.g. Sharepoint
Knowledge portals
Dashboards
Next-gen intranets
60%
B2B
Supply chains connected
Partner workforces
New – built from cloud
apps
Building Customer Portals: The Old Way
Adopt what
software you can2
Pick a
Platform1
Deploy, monitor,
maintain, updateN
Get developers to
write additional apps3
Building Portals With the Cloud
Product
Quote & Order
Processing
Collaboration
Product
Pick the best apps
for business need
Build custom apps
on the best platform
as needed
Link together with
a simple portal
New problems:
• How to synchronize
accounts?
• How do you
provide SSO?
Helpdesk
Okta for Portals Collaboration
Helpdesk
Product
Customer or Partner Network
Product
Quote & Order
Processing
•  Easy to use
•  Cloud Service
•  Comprehensive
•  Secure
Register once
Login once
Individual Users or
Partner Networks
1
2
3
Leading Companies have Chosen Okta for Portals
okta confidential 46
The Business Case for Okta
Quantifying the Value of Okta
okta confidential 47
The Value of Okta’s Benefits
okta confidential 48
Improve User
Productivity
$300/user/yr productivity gain
Faster app rollout & adoption
Increase Security
& Control
Minimize passwords
Control cloud app usage
Ensure Compliance,
Maximize SaaS ROI
Access: who, what
De-prov audit trail
Seat utilization
Reduce IT Costs
Save $25k per AD integration
Cut provisioning time by 30%
No 3rd party MFA costs
1 2
3 4
3,300 users | 100 apps
“Cloud IAM is the best option, providing
310% ROI over manual processes”
- Forrester Research, October 2012
> $10M
savings
over 3
years
okta confidential 49
Okta was named a Leader (highest ranking)
okta confidential 50
1200 employees
12 applications
Enterprise Edition
okta confidential 51
900 employees
50 applications
Enterprise Edition
okta confidential 52
550 users
12 applications
Enterprise Edition
okta confidential 53
okta confidential 54

More Related Content

What's hot

Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
FIDO Alliance
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
Gowdhaman Jothilingam
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
Sounil Yu
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
rtp2009
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
Priyanka Aash
 
The Rise of Secrets Management
The Rise of Secrets ManagementThe Rise of Secrets Management
The Rise of Secrets Management
Akeyless
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
Thierry DEMAN
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
Denise Bailey
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
Tripwire
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
Ronnie Isherwood
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
Yash
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
Dawn Yankeelov
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
Hybrid IT Europe
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
Mustafa Kuğu
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
Cheah Eng Soon
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 

What's hot (20)

Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
 
The Rise of Secrets Management
The Rise of Secrets ManagementThe Rise of Secrets Management
The Rise of Secrets Management
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 

Viewers also liked

Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Okta-Inc
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
Okta-Inc
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Okta-Inc
 
Ppt okta
Ppt oktaPpt okta
Ppt okta
Novya Rismawan
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
7Summits
 
Oktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTAOktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTA
Joseph Gazarik, MCSE, VCP, ITSMv3 Foundation
 
drupalfr - Revue de modules partager
drupalfr - Revue de modules partagerdrupalfr - Revue de modules partager
drupalfr - Revue de modules partager
Drupal Asso France
 
Okta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanOkta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from Atidan
David J Rosenthal
 
CIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - oktaCIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - okta
IDGnederland
 
Identity access management
Identity access management Identity access management
Identity access management
Prof. Jacques Folon (Ph.D)
 
Identity access management
Identity access managementIdentity access management
Identity access management
Prof. Jacques Folon (Ph.D)
 
AWS re:Invent 2016: Innovation After Installation: Establishing a Digital Rel...
AWS re:Invent 2016: Innovation After Installation: Establishing a Digital Rel...AWS re:Invent 2016: Innovation After Installation: Establishing a Digital Rel...
AWS re:Invent 2016: Innovation After Installation: Establishing a Digital Rel...
Amazon Web Services
 
Identity as a Service - Etude IDaaS
Identity as a Service - Etude IDaaSIdentity as a Service - Etude IDaaS
Identity as a Service - Etude IDaaS
Marc Rousselet
 
KMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelKMS at Okta - Intermediate Level
KMS at Okta - Intermediate Level
Jon Todd
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta
Amazon Web Services
 
ECS and Docker at Okta
ECS and Docker at OktaECS and Docker at Okta
ECS and Docker at Okta
Jon Todd
 
Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWS
Amazon Web Services
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
Prof. Jacques Folon (Ph.D)
 
Atelier IDaaS - Les assises de la sécurité - 2013
Atelier IDaaS - Les assises de la sécurité - 2013Atelier IDaaS - Les assises de la sécurité - 2013
Atelier IDaaS - Les assises de la sécurité - 2013
Marc Rousselet
 
Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"
iGlobe
 

Viewers also liked (20)

Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
Pre-built, Secure Identity Layer for Consumer Websites, B2B Portals and SaaS ...
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
Ppt okta
Ppt oktaPpt okta
Ppt okta
 
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...How Okta Created a Customer Community To Drive Engagement and Manage Support ...
How Okta Created a Customer Community To Drive Engagement and Manage Support ...
 
Oktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTAOktane13-O365_v2-JGAZARIK-OKTA
Oktane13-O365_v2-JGAZARIK-OKTA
 
drupalfr - Revue de modules partager
drupalfr - Revue de modules partagerdrupalfr - Revue de modules partager
drupalfr - Revue de modules partager
 
Okta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from AtidanOkta Directory Integration for Microsoft Office365 - from Atidan
Okta Directory Integration for Microsoft Office365 - from Atidan
 
CIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - oktaCIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - okta
 
Identity access management
Identity access management Identity access management
Identity access management
 
Identity access management
Identity access managementIdentity access management
Identity access management
 
AWS re:Invent 2016: Innovation After Installation: Establishing a Digital Rel...
AWS re:Invent 2016: Innovation After Installation: Establishing a Digital Rel...AWS re:Invent 2016: Innovation After Installation: Establishing a Digital Rel...
AWS re:Invent 2016: Innovation After Installation: Establishing a Digital Rel...
 
Identity as a Service - Etude IDaaS
Identity as a Service - Etude IDaaSIdentity as a Service - Etude IDaaS
Identity as a Service - Etude IDaaS
 
KMS at Okta - Intermediate Level
KMS at Okta - Intermediate LevelKMS at Okta - Intermediate Level
KMS at Okta - Intermediate Level
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta
 
ECS and Docker at Okta
ECS and Docker at OktaECS and Docker at Okta
ECS and Docker at Okta
 
Streamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWSStreamline Identity Management & Administration on AWS
Streamline Identity Management & Administration on AWS
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Atelier IDaaS - Les assises de la sécurité - 2013
Atelier IDaaS - Les assises de la sécurité - 2013Atelier IDaaS - Les assises de la sécurité - 2013
Atelier IDaaS - Les assises de la sécurité - 2013
 
Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"Okta: "Businesses at work march 2016"
Okta: "Businesses at work march 2016"
 

Similar to Company and Market Overview

How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...
Amazon Web Services
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
ThousandEyes
 
30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud
Vuzion
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
RENJITHKNAIR5
 
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
ThousandEyes
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
ThousandEyes
 
Data Integration for Both Self-Service Analytics and IT Users
Data Integration for Both Self-Service Analytics and IT Users Data Integration for Both Self-Service Analytics and IT Users
Data Integration for Both Self-Service Analytics and IT Users
Senturus
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
RapidValue
 
Solace Singapore User Group: Dell Boomi Presentation
Solace Singapore User Group: Dell Boomi PresentationSolace Singapore User Group: Dell Boomi Presentation
Solace Singapore User Group: Dell Boomi Presentation
Solace
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
ThousandEyes
 
2019 03 products customer partner webinar | March 2019
2019 03 products customer partner webinar | March 20192019 03 products customer partner webinar | March 2019
2019 03 products customer partner webinar | March 2019
MarkSilvester11
 
Acquia Platform Update: New Features and Capabilities
Acquia Platform Update: New Features and CapabilitiesAcquia Platform Update: New Features and Capabilities
Acquia Platform Update: New Features and Capabilities
Rachel Wandishin
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
ThousandEyes
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
Seokminyoon4
 
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
Peter de Haas
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
SolarWinds
 
Microsoft Cloud Computing
Microsoft Cloud ComputingMicrosoft Cloud Computing
Microsoft Cloud Computing
IDG Romania
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
Quest
 
Unlocking the Power of IoT: A comprehensive approach to real-time insights
Unlocking the Power of IoT: A comprehensive approach to real-time insightsUnlocking the Power of IoT: A comprehensive approach to real-time insights
Unlocking the Power of IoT: A comprehensive approach to real-time insights
confluent
 
How to monitor all aspects of Citrix NetScaler usage and performance within t...
How to monitor all aspects of Citrix NetScaler usage and performance within t...How to monitor all aspects of Citrix NetScaler usage and performance within t...
How to monitor all aspects of Citrix NetScaler usage and performance within t...
eG Innovations
 

Similar to Company and Market Overview (20)

How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud30 March 2017 - Vuzion Ireland Love Cloud
30 March 2017 - Vuzion Ireland Love Cloud
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
AMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes WebinarAMER Introduction to ThousandEyes Webinar
AMER Introduction to ThousandEyes Webinar
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
 
Data Integration for Both Self-Service Analytics and IT Users
Data Integration for Both Self-Service Analytics and IT Users Data Integration for Both Self-Service Analytics and IT Users
Data Integration for Both Self-Service Analytics and IT Users
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
Solace Singapore User Group: Dell Boomi Presentation
Solace Singapore User Group: Dell Boomi PresentationSolace Singapore User Group: Dell Boomi Presentation
Solace Singapore User Group: Dell Boomi Presentation
 
Troubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyesTroubleshooting Webex and Microsoft Teams with ThousandEyes
Troubleshooting Webex and Microsoft Teams with ThousandEyes
 
2019 03 products customer partner webinar | March 2019
2019 03 products customer partner webinar | March 20192019 03 products customer partner webinar | March 2019
2019 03 products customer partner webinar | March 2019
 
Acquia Platform Update: New Features and Capabilities
Acquia Platform Update: New Features and CapabilitiesAcquia Platform Update: New Features and Capabilities
Acquia Platform Update: New Features and Capabilities
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Microsoft Cloud Computing
Microsoft Cloud ComputingMicrosoft Cloud Computing
Microsoft Cloud Computing
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Unlocking the Power of IoT: A comprehensive approach to real-time insights
Unlocking the Power of IoT: A comprehensive approach to real-time insightsUnlocking the Power of IoT: A comprehensive approach to real-time insights
Unlocking the Power of IoT: A comprehensive approach to real-time insights
 
How to monitor all aspects of Citrix NetScaler usage and performance within t...
How to monitor all aspects of Citrix NetScaler usage and performance within t...How to monitor all aspects of Citrix NetScaler usage and performance within t...
How to monitor all aspects of Citrix NetScaler usage and performance within t...
 

Recently uploaded

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Company and Market Overview

  • 2. Identity and Okta Enterprise Identity, Delivered okta confidential 2
  • 5. Applications Devices People + Custom, + Cloud, + Mobile Applications Devices People + iPhone, Android, + iPad + Remote, + Partners, + Customers Identity
  • 6. Pain for end users
  • 7. Pain for IT Time consuming user provisioning
  • 9. All Your Devices All Your People Desktop, Laptops, Tablets, Smartphones, Employees, Customers, Partners, Contractors Mobile On Prem Cloud On Prem Identity LDAP
  • 10.
  • 11.
  • 12.
  • 14. All Your Devices All Your People Desktop, Laptops, Tablets, Smartphones, Employees, Customers, Partners, Contractors Mobile On Prem Cloud On Prem Identity LDAP
  • 15. All Your Devices All Your People Desktop, Laptops, Tablets, Smartphones, Employees, Customers, Partners, Contractors Mobile On Prem Cloud On Prem Identity LDAP Strengthen Security Increase Productivity Reduce IT Costs
  • 16. 3,300 users | 100 apps “Cloud IAM is the best option, providing 310% ROI over manual processes” - Forrester Research, October 2012 > $10M savings
  • 17. Okta was named a Leader (highest ranking)
  • 18. Legacy IdM Solutions Have Not Delivered okta confidential 18 ApplicationsUsers Employees, One Desktop On Premises •  On Prem Apps •  Desktop Access •  VPN Control Point Well Defined Problem1 •  Multi-year $2-$5M TCO •  Services, 4-5x licenses •  HW, SW, Integrations Expensive SW, and Deployments2 •  Connector Treadmill •  Forklift Upgrades •  Labor Intensive Costly Ongoing Maintenance3
  • 19. Identity Strategies are Facing a Fundamental Choice okta confidential 19 “Cloud IAM Has Superior ROI” “Cloud IAM is the best option; 310% ROI over manual processes, 90% reduction of operations vs. on-prem solutions.” “By the end of 2015, IDaaS will account for 40% of all new IAM sales” •  HW, SW, Infrastructure •  Services Intense •  Connector Treadmill •  Forklift Upgrades •  Service •  Enterprise Grade •  Integrated •  Future Proof •  Easy to Use
  • 20. Connecting People to Apps: Anywhere, Anytime, Any Device okta confidential 20 All Your Devices All Your People Desktop, Laptops, Tablets, Smartphones, Employees, Customers, Partners, Contractors Mobile On Prem Cloud On Prem Identity LDAP SSO, Integrated MFA • Any Device, Any App Provisioning & Deprovisioning • Workflow, Audit, Self Service Centralized Admin & Reporting • Policy, Compliance, Analytics Robust On Prem Integration • Directories, Identity Mgmt, Apps
  • 21. okta confidential 21 -  Business & Consumer Apps -  Deep Integrations -  Continually Monitored -  Constantly Expanding 1000’s of Apps, All Pre-Integrated
  • 22. A Secure, Reliable and Up-to-Date Service -  Highly redundant service footprint -  Eight AWS Availability Zones -  Two geographic regions (VA and OR) -  Near perfect availability in 2012 -  527,040min uptime, 2min of downtime -  www.okta.com/trust -  SOC2 Type II audited -  Across all 5 Trust Principles -  Dedicated Tech Ops team -  SixApart, Cisco, IronPort, Zynga, MediaTemple, Hotwire, Qwest, CollabNet -  48 feature releases annually okta confidential 22
  • 23. Deployment Architecture – Highly Redundant okta confidential 23 1 2 DC 1DC 2 Proxy Load Balancers App Servers Databases 1 2 3 4 5 okta.com okta-admin.com Internet Anycast DNS 3
  • 24. One Service, Addresses Two Identity Problems okta confidential 24 Remote/Mobile Employees Employees Identity Management for Internal Employees Customers/ Partners Identity Management for Customer & Partner Portals
  • 25. Okta for Portals Collaboration Helpdesk Product Customer or Partner Network Product Quote & Order Processing •  Easy to use •  Cloud Service •  Comprehensive •  Secure Register once Login once Individual Users or Partner Networks 1 2 3
  • 26. Market Leader in Identity & Access Management •  All Users, Devices & Apps •  SSO, Strong Authentication, Provisioning, Analytics •  Thousands of Pre-integrated Applications •  Integrates and Extends Legacy Identity Infrastructure Modern Identity Service Enterprise Service and Support •  Zero Downtime Service Architecture •  Professional Services Team with Deep Identity Background •  24 / 7 / 365 Support Veteran Team “Okta makes our problems their own and it’s why we can rely on them to make us successful.” “Gatwick Airport never shuts down, and we expect the same from our partners. Okta's enterprise-grade service was the only solution that could meet our technical, operational and security requirements.” okta confidential 26
  • 27. Applications and the Cloud A Changing Landscape okta confidential 27
  • 28. okta confidential 28 The cloud is delivering real benefits now
  • 29. okta confidential 29 The cloud is only going to get more effective March 2013 Announcing New Lower Pricing for Amazon EC2 “…today’s price drop represents the 26th price drop for AWS”
  • 34. Mobility The Stunning Disruption of the PC okta confidential 34
  • 38.
  • 40. Managing External Identities Connecting Customers and Partners to your Business okta confidential 40
  • 41. What is a Portal? Partners Employees Customers MyCo portal account support shipping Account app Support app Shipping app •  Where you conduct business online •  Your services •  Partner management •  Customer support •  Customers, partners, employees
  • 42. Portals – company to company collaboration increasing okta confidential 42 B2E e.g. Sharepoint Knowledge portals Dashboards Next-gen intranets B2C E-business portals Constituent portals B2B Supplier portals Distributor portals 2007 60% 25% 15% 2013source: Gartner B2C Tied to revenue “Ease of Use” is critical New - built from cloud apps B2E e.g. Sharepoint Knowledge portals Dashboards Next-gen intranets 60% B2B Supply chains connected Partner workforces New – built from cloud apps
  • 43. Building Customer Portals: The Old Way Adopt what software you can2 Pick a Platform1 Deploy, monitor, maintain, updateN Get developers to write additional apps3
  • 44. Building Portals With the Cloud Product Quote & Order Processing Collaboration Product Pick the best apps for business need Build custom apps on the best platform as needed Link together with a simple portal New problems: • How to synchronize accounts? • How do you provide SSO? Helpdesk
  • 45. Okta for Portals Collaboration Helpdesk Product Customer or Partner Network Product Quote & Order Processing •  Easy to use •  Cloud Service •  Comprehensive •  Secure Register once Login once Individual Users or Partner Networks 1 2 3
  • 46. Leading Companies have Chosen Okta for Portals okta confidential 46
  • 47. The Business Case for Okta Quantifying the Value of Okta okta confidential 47
  • 48. The Value of Okta’s Benefits okta confidential 48 Improve User Productivity $300/user/yr productivity gain Faster app rollout & adoption Increase Security & Control Minimize passwords Control cloud app usage Ensure Compliance, Maximize SaaS ROI Access: who, what De-prov audit trail Seat utilization Reduce IT Costs Save $25k per AD integration Cut provisioning time by 30% No 3rd party MFA costs 1 2 3 4
  • 49. 3,300 users | 100 apps “Cloud IAM is the best option, providing 310% ROI over manual processes” - Forrester Research, October 2012 > $10M savings over 3 years okta confidential 49
  • 50. Okta was named a Leader (highest ranking) okta confidential 50
  • 51. 1200 employees 12 applications Enterprise Edition okta confidential 51
  • 52. 900 employees 50 applications Enterprise Edition okta confidential 52
  • 53. 550 users 12 applications Enterprise Edition okta confidential 53