An increase in Productivity by 4.4%
40% fewer defects in Performance
Stronger Engagement with 40% lower absenteeism
12% reduction in expenditure due to employees Retention
Increase in Profit by 21%
First, our thought and prayers are with everyone impacted by this world crisis of Covid-19 pandemic. We also express our heartfelt gratitude to the millions of dedicated healthcare workers across the world for their service and sacrifice during this pandemic.
Due to this pandemic, there has been a dramatic increase in the number of organizations, who are encouraging remote working to their employees for their safety.
With our partner Okta, ISSQUARED® is committed to offer our customers workplace flexibility by enabling them to have a secure and robust remote access to their critical business applications. Our Identity and Access Management provider Okta is also offering:
“Okta for Emergency Remote Work enables secure and seamless remote access for all your employees to the most critical business applications from any location and on any device.”
Stay productive and safe during this covid-19 pandemic
Enables seamless remote access for all your employees to their most critical applications
We have answered some of the most commonly asked questions about Okta for Emergency Remote Work. If you are interested in learning more about the application, please contact us
Ans. To enhance the workplace flexibility and collaboration, we suggest you to use Microsoft Office 365 E1, UC
flex, Mitel, Net2Phone, etc.
Ans. With Okts’s Single Sign-on solution, you can integrate your IaaS platforms with SSO solution to enable the
access to your server using the same set of credentials.
Ans. You can implement multi-factor authentication by enabling biometrics with WebAuthn (FIDO2.0), mobile
authentication using Okta Verify, SMS OTP and Email OTP. It is
advisable to use at least two methods of authentication.
Ans. If you have implemented SSO, MFA to all your employees, consider creating some individual access policies
based on users, devices, locations and networks like disallow
POP/IMAP based authentication to MS Office 365, create blocklist for
network access, enable device checks etc.