Incorporation of Auth0 features and more closely integrated management highlights new cloud-based IAM (identity and access management) system. Credit: CIS Potential access management customers got a new option from Okta Wednesday, as the identity and access management (IAM) provider announced a newly streamlined Consumer Identity Cloud system designed to simplify the deployment and use of its various products.Okta said that the new cloud program is split into two main components—those aimed at providing identity validation services for consumers, and those aimed at enterprise customers. The former is focused on providing high-security options for online transactions, support for passkeys (instead of passwords, which are thought to be less secure), and providing an all-in-one security center monitoring system for quick response to suspicious activity.The customer identity cloud for SaaS apps includes Okta’s Workforce Enterprise Connection, which provides a turnkey integration for Okta’s Workforce Identity Cloud system for logins across a business’ systems, as well as directory synchronization, custom security policies and more.The platform runs in Okta’s own cloud, meaning there’s no need for a data center or own-cloud presence, which is an architecture that some organizations will be more comfortable with than others, depending on their compliance needs. Okta said that the average organization deploys 89 online apps, and that it’s a universal challenge for organizations to manage logins and identity without causing user headaches and lots of extra work for developers.“Conventional wisdom tells us that you can make an application super secure, but very inconvenient to use,” said Eugenio Pace, president of customer identity at Okta. “Or you can make it super convenient, but at the cost of security or privacy. This is a false choice.” According to Henrique Teixeira, senior director and analyst at Gartner Research, one of the top cybersecurity trends for 2022 has been identity-based threat detection and response, which means that Okta’s new offering could conceivably prove helpful for a wide range of users.“Attacks to identity systems are on the rise,” he said. “It really doesn’t matter if an organization is using one or multiple vendors, all identity systems became prime targets for malicious attacks.”Related: How passkeys are changing authenticationAn alternative to multiple in-house IAM appsCurrently, a large number of organizations are still using in-house, custom-built solutions for identity management, particularly on the consumer-facing side. This means that a unitary identity management system could be a dramatic simplification for a large number of potential users, according to Teixeira.What’s more, Okta’s recent acquisition of Auth0, an identity management platform, brings with it new capabilities that the company has now integrated into the new Consumer Identity Cloud product. In the immediate wake of the acquisition, Auth0 had operated as a fully independent business unit, but no longer.“[The new product] reduces the confusion of overlapping features from the two companies,” said Teixeira. “Capabilities like bot detection, available in Auth0, help with the [threat response] side of the equation.” Okta said that most capabilities of the new system are available today, with more features, including support for “highly regulated identity” management, expected to launch by the end of next year’s second quarter. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe