Why MFA, why now?
A discussion with Okta and Salesforce on the new MFA requirement


In the last year, we’ve seen a growing number of organizations have required Multi-factor Authentication (MFA) be implemented to remain compliant and accessible.
Salesforce is the latest to require an MFA solution, or their own homegrown solution enabled for uninterrupted access. These events are reiterating the importance of having a scalable IAM strategy in place.
Watch this on-demand webinar now to learn:
- How Okta's Adaptive MFA protects against data breaches and satisfies compliance regulations by providing secure authentication
- What the new Salesforce MFA requirement means for your organization
- A live demo of Okta's aMFA product
Provided by Okta
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Forget MFA fatigue, attackers are exploiting ‘click tolerance’ to trick users into infecting themselves with malware
News Threat actors are exploiting users’ familiarity with verification tests to trick them into loading malware onto their systems, new research has warned.
By Solomon Klappholz Published
-
How to implement identity and access management (IAM) effectively in your business
whitepaper With pressure from the board and a new wave of threats, security leaders looking to implement IAM should start small and lean on the data
By ITPro Published
-
Game-changing data security in seconds. Lepide’s real time In-browser demo
whitepaper Protect sensitive data and detect threats
By ITPro Published
-
The (hard) key to stop phishing
whitepaper How Cloudflare stopped a targeted attack and you can too
By ITPro Published
-
Three ways to evolve your security operations
Whitepaper Why current approaches aren’t working
By ITPro Published
-
Why your business needs zero trust
Whitepaper How zero trust can right the wrongs of legacy security architecture
By ITPro Published
-
Four measures SMBs can take to avoid common security pitfalls
In-depth Security can be challenging for SMBs, but it’s possible to make yourself more resilient to reduce the impact of cyber attacks
By Kate O'Flaherty Published
-
The One True Zero Trust Platform
Whitepaper Accelerate secure digital transformation with the Zscaler Zero Trust Exchange
By ITPro Published