AI Buyer Insights:

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Michelin, an e2open customer evaluated Oracle Transportation Management

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Michelin, an e2open customer evaluated Oracle Transportation Management

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

List of Okta Privileged Access Management Customers

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Box Professional Services 2810 $1.1B United States Okta Okta Privileged Access Management Identity and Access Management (IAM) 2024 n/a
In 2024, Box declared plans to extend its identity strategy to Okta Privileged Access Management to adopt just in time credentials and further enforce zero standing privileges. Box implemented Okta Identity Governance to enforce zero standing privilege policies for end user device admin access and to run access certifications within its security and governance program in the United States, work that sits in the Identity and Access Management (IAM) category and that yielded faster reviews and reduced manual effort. The Okta Privileged Access Management implementation is described as the next step to sit alongside Okta Identity Governance, preserving a consolidated Identity and Access Management (IAM) platform architecture. Implementation narratives indicate the PAM deployment will be scoped to manage privileged elevation, time bound access, and session controls for device administrator workflows, aligning privileged workflows with existing access certification cadences and policy enforcement. Operational coverage is centered on Box security and IT governance functions in the United States, with Privileged Access Management intended to integrate into current access review and certification processes. Governance changes focus on eliminating standing privileges through policy driven, time limited credentials and by centralizing privileged access controls under the broader Identity and Access Management (IAM) program, while preserving the faster review cycles and reduced manual effort achieved by Okta Identity Governance.
LiveView Technologies (LVT) Professional Services 550 $62M United States Okta Okta Privileged Access Management Identity and Access Management (IAM) 2023 n/a
In 2023, LiveView Technologies implemented Okta Privileged Access Management as part of a broader Identity and Access Management (IAM) initiative. The deployment complemented an existing Okta Workforce Identity implementation with Identity Governance, and was rolled out to address onboarding and offboarding automation and access lifecycle controls across the United States. Configuration centered on identity lifecycle automation and access request workflows, using Identity Governance to enforce zero standing privileges and reduce standing administrative rights. Okta Privileged Access Management was applied to extend privileged controls, aligning just in time access and privileged account controls with the organization s existing identity governance policies and non human identity management. Operational coverage focused on IT and identity lifecycles, integrating privileged access controls with provisioning and IT ticketing workflows to streamline approvals and reduce manual provisioning steps. The implementation covered controls for both human and non human identities, centralizing access request orchestration and entitlement review processes under the Identity and Access Management (IAM) program. Governance changes included formalized access request and approval workflows and policy driven entitlement enforcement to sustain zero standing privileges. As a result of the Okta Workforce Identity and Identity Governance configuration, LiveView Technologies reported reduced provisioning time and a reduction in IT tickets tied to access management.
Personal Capital Banking and Financial Services 1018 $200M United States Okta Okta Privileged Access Management Identity and Access Management (IAM) 2018 n/a
In 2018, Personal Capital deployed Okta Privileged Access Management to unify workforce identity and secure SSH and RDP access for engineering and operations teams in the United States. The deployment positioned Okta Privileged Access Management within the Identity and Access Management (IAM) category to govern server and infrastructure access across cloud and on premise environments. Implementation focused on server and infrastructure access controls, including privileged session management, certificate based SSH access, and centralized credential handling as consistent with Identity and Access Management (IAM) capabilities. Module usage for Okta Privileged Access Management is inferred from Personal Capital's public Advanced Server Access deployment and Okta's product roadmap that folded ASA capabilities into Okta Privileged Access, indicating ASA style server access controls and audit logging capabilities were applied. This inferred configuration included agent based access enforcement and role based access controls to centralize SSH and RDP authentication and reduce credential sprawl. Operational coverage targeted engineering and operations teams in the United States, where the solution centralized workforce identity for infrastructure access and improved auditability of privileged sessions. The implementation affected infrastructure operations and engineering workflows by centralizing access control and reducing long lived credentials, and access governance and audit processes were strengthened as part of the rollout.
Showing 1 to 3 of 3 entries

Buyer Intent: Companies Evaluating Okta Privileged Access Management

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Okta Privileged Access Management. Gain ongoing access to real-time prospects and uncover hidden opportunities.

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD Okta Privileged Access Management Coverage

Okta Privileged Access Management is a Identity and Access Management (IAM) solution from Okta.

Companies worldwide use Okta Privileged Access Management, from small firms to large enterprises across 21+ industries.

Organizations such as Box, Personal Capital and LiveView Technologies (LVT) are recorded users of Okta Privileged Access Management for Identity and Access Management (IAM).

Companies using Okta Privileged Access Management are most concentrated in Professional Services and Banking and Financial Services, with adoption spanning over 21 industries.

Companies using Okta Privileged Access Management are most concentrated in United States, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of Okta Privileged Access Management across Americas, EMEA, and APAC.

Companies using Okta Privileged Access Management range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 33.33%, large organizations with 1,001-10,000 employees - 66.67%, and global enterprises with 10,000+ employees - 0%.

Customers of Okta Privileged Access Management include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified Okta Privileged Access Management customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Identity and Access Management (IAM).