Rezonate was recognized as a 2023 Gartner® Cool Vendor™ in Identity-First Security. Learn More.

ISPM

Microsoft Entra ID: The Complete Guide to Conditional Access Policies

Get everything you need to know about using EntraID Conditional Access policies to boost your identity security posture.
Read More

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of ...

Read More

A Guide to the Gartner IAM Summit in London

Get a checklist for 6 critical learning objectives for the event, and jump start your agenda planning with our top 10 analyst session picks. In just one week, Europe’s version of ...

Read More
Midnight Blizzard's Microsoft Hack: How ITDR Could Have Helped Microsoft

How ITDR Could Have Helped Microsoft in the Midnight Blizzard Hack

Identity-based attacks are on the rise, but they can be prevented with the right identity threat detection and response (ITDR) measures.  As winter crept in last year, so did identity ...

Read More
Top 10 Features to Enhance Okta Security Posture

Top 10 Features to Enhance Your Okta Security Posture 

We break down 10 key security configurations and features to ensure robust authentication and identity management within your Okta instance to help prevent future attacks.

Read More
A Step-by-Step Guide to Okta Identity Governance

A Step-by-Step Guide to Okta Identity Governance

How many identities does your organization manage? Hundreds, maybe even thousands? Efficiently and effectively managing these identities and their access privileges can be a major headache, ...

Read More
IAM vs PAM: What is the Difference?

IAM vs PAM: What is the Difference?

Your employees can likely access anything from anywhere. For example, features like Single Sign On (SSO) provide employees with seamless access to the necessary tools and resources, helping ...

Read More
5 Tips to Make Sense of the Gartner IAM MQ and Cool Vendor

5 Tips to Make Sense of the Gartner IAM MQ and Cool Vendor

In a sea of great vendors (and maybe one or two bad ones!), how do you choose the solution that will help you achieve secure, visible, and efficient IAM? As a leading voice in technology ...

Read More
How Threat Actors Leveraged HAR Files to Attack Okta’s Customers

How Threat Actors Leveraged HAR Files to Attack Okta’s Customers

On October 19, 2023, Okta notified its customers of a security breach involving unauthorized access to their support system. This incident occurred when an external party obtained and misused ...

Read More