Access
Owl
Menu
Solutions
Stakeholder
IT
CTO
HR
Use Cases
Automate On- & Offboarding
Access Requests & Approval workflows
User Account Provisioning
Compliance & Reporting
Customers
Pricing
Blog
Get in touch
Get free demo
Blog
By Phil Muncaster
Cybersecurity in startups: Three ways to balance speed and security | Expert Series
Expert Series
Cybersecurity
Read more
April 1, 2024
6 min read
By Marijan Hassan
Google SSO vs. Okta: Comparing features, pricing and use cases
Google SSO
Okta
IAM
Read more
March 30, 2024
8 min read
By Phil Muncaster
Shadow IT: How to Deal with a Problem You Can’t Quantify? | Expert Series
Expert Series
Shadow IT
CISO
Read more
March 21, 2024
8 min read
By Susan Marrow
What is SAML vs. OAuth
What Is
SAML
OAuth
Read more
February 22, 2024
7 min read
By Phil Muncaster
The SSO Tax: The Challenges of Managing Access Without SCIM and SAML | Expert Series
Expert Series
SSO Tax
CISO
Read more
February 20, 2024
7 min read
By Susan Marrow
Shadow IT: The Dangers and How to Avoid them
Shadow IT
Read more
February 15, 2024
7 min read
By Phil Muncaster
Top Identity and Access Management Challenges for CISOs | Expert Series
Expert Series
IAM
CISO
Read more
February 10, 2024
8 min read
By Susan Marrow
What Is IGA (Identity Governance and Administration)
What Is
IGA
Read more
February 6, 2024
6 min read
By Phil Muncaster
The CISO role is changing: This is what CISOs have to say about it | Expert Series
Expert Series
CISO
Read more
February 3, 2024
9 min read
By Marijan Hassan
Your Guide to the SSO Tax: Why It Exists, Costs, and Workarounds
SSO Tax
Read more
February 1, 2024
8 min read
By Susan Marrow
What Is IAM (Identity and Access Management)?
What Is
IAM
Read more
January 25, 2024
6 min read
By Phil Muncaster
“The Department of No”: The Challenges and Risks of Building a Cybersecurity Program | Expert Series
Expert Series
CISO
InfoSec
Read more
January 20, 2024
6 min read
By Susan Marrow
What is Authentication vs. Authorization
What Is
Authentication
Authorization
Read more
January 16, 2024
6 min read
By Phil Muncaster
Getting Started as CISO: 3 Ways Visibility Is Critical to Success | Expert Series
Expert Series
CISO
Read more
October 3, 2023
5 min read
By Susan Marrow
What Is MFA (Multifactor Authentication)
What Is
MFA
Read more
September 10, 2023
6 min read
By Kasper Siig
The True Cost of Okta
Okta
Costs
Read more
August 17, 2023
7 min read
By Phil Muncaster
Top 6 Misconceptions About ISO 27001 and SOC 2 | Expert Series
Expert Series
Auditor
ISO27001
SOC 2
Read more
August 10, 2023
5 min read
By Kasper Siig
Top 5 Access Controls for Obtaining and Retaining SOC 2 and ISO 27001 Certifications
SOC 2
ISO 27001
Read more
August 1, 2023
11 min read
By Kasper Siig
The Limitations of Google SSO and how to Overcome them
Google SSO
IAM
IGA
Read more
July 27, 2023
9 min read
By Phil Muncaster
5 Quick Wins for new IT Managers | Expert Series
Expert Series
IT Manager
Read more
July 20, 2023
5 min read
By Kasper Siig
RBAC vs ABAC: Comparing and Combining Access Control Strategies
RBAC
ABAC
Read more
July 12, 2023
9 min read
By Kasper Siig
Top Okta Alternatives | Identity Providers Explored
IAM
Okta
Read more
July 4, 2023
9 min read
By Phil Muncaster
SCIM Provisioning: The Pros, the Cons, and Everything You Need to Know
SCIM
Auto Provisioning
Read more
May 24, 2023
6 min read
By Kumar Harsh
Demystifying User Provisioning: A Complete Guide
Auto Provisioning
Deprovisioning
Read more
May 17, 2023
7 min read
By Linda Rosencrance
User Access Reviews: Best Practices for Successful Audits
Access Review
Compliance
Audits
Read more
May 10, 2023
9 min read
By Kasper Siig
What are the Limitations of SSO? | Identity and Access Management
SSO
IAM
Read more
May 4, 2023
11 min read