E-commerce websites and enterprise applications sometimes have to handle a lot of traffic, but are not always able to do that. Cyber security vendor Okta has updated its Identity Cloud solution to make this possible.
With the Identity Cloud, companies can manage access to their systems. If a user wants to log into the system, they must first authenticate themselves via the Identity Cloud. The platform also regulates which application functions employees can use, and offers, among other things, single sign-on for various services.
Okta has now updated Identity Cloud for companies that have to deal with a lot of network traffic, writes Silicon Angle. With the new DynamicScale, Identity Cloud can handle 500,000 authentication requests per minute, according to the company. That’s so much that Salesforce’s daily API request limit would be reached within 120 seconds.
DynamicScale is useful for all kinds of different use cases, says Okta. Online retailers can use it, for example, during peak periods around the holidays, when an awful lot of users try to log in to their services.
Other companies can use DynamicScale to handle short peaks of user interest after, for example, product launches and large marketing campaigns.
According to Okta, developers can also take advantage of the increased capacity. This is because performance testing tools have been launched. This allows developers to see during testing how well their applications can handle a lot of traffic. The tools subject the applications to a thousand times more authentication requests than they normally have to process.
DynamicScale’s announcement follows a month after Okta announced that it will also be collaborating more with Proofpoint for protection against cyber attacks. The two companies are integrating Proofpoint’s Targeted Attack Protection index and Okta Identity Cloud.
The intention is that users with a high risk of cyberattacks will be better protected in this way. The identity of these people is identified by the Proofpoint index. Identity Cloud will then be used to set up stricter access controls.