Customer Company Size
Mid-size Company
Region
- America
Country
- United States
Product
- Okta Multi-Factor Authentication (MFA)
- Okta Single Sign-On (SSO)
- Okta Universal Directory
- Okta Customer Identity Access Management (CIAM)
- Okta Authentication
Tech Stack
- SAML
- OAuth
- APIs
Implementation Scale
- Enterprise-wide Deployment
Impact Metrics
- Productivity Improvements
- Customer Satisfaction
- Digital Expertise
Technology Category
- Cybersecurity & Privacy - Identity & Authentication Management
- Application Infrastructure & Middleware - API Integration & Management
Applicable Industries
- Software
- Professional Service
Applicable Functions
- Business Operation
- Product Research & Development
Services
- System Integration
- Software Design & Engineering Services
About The Customer
Kensho Technologies, a subsidiary of S&P Global, is a company that leverages world-class data to develop AI and machine learning solutions. These solutions are designed to help customers make data-driven decisions by extracting valuable insights from unstructured data. Kensho's capabilities in machine learning, natural-language processing, and data discovery enable it to build solutions that pull valuable business insights for corporate clients. Acquired by S&P Global in 2018, Kensho operates with a workforce of about 100 employees, primarily engineers. Despite the acquisition, Kensho maintains its independent start-up culture, focusing on creating a powerful AI toolkit that combines its solutions with S&P Global's extensive data resources. Kensho's existing solutions include Kensho Datasets, Scribe, NERD, Link, Extract, Classify, and more, which are used to unlock valuable insights for organizations.
The Challenge
Kensho Technologies, a subsidiary of S&P Global, faced challenges in maintaining its identity infrastructure as it scaled its AI and machine learning solutions. The company had adopted new identity management systems on an ad-hoc basis, leading to a disjointed environment with troubleshooting, maintenance, and monitoring challenges. As Kensho's products scaled within S&P Global and with its clients, the need to address identity maintenance challenges became critical. Kensho considered building a new system in-house, but this would have required significant resources, diverting attention from business goals. The company needed a solution that would ease the workload for its employees while ensuring top-tier and secure customer experiences.
The Solution
Kensho Technologies decided to partner with Okta to address its identity management challenges. Okta provided a consolidated solution that met all of Kensho's authentication and authorization requirements in a single location, establishing a standard for all applications. The integration with Okta allowed Kensho to scale more easily, thanks to Okta's strong API and documentation, which facilitated faster implementation. Kensho purchased Okta products such as Multi-Factor Authentication (MFA), Single Sign-On (SSO), and Universal Directory for secure employee access to cloud-based apps. For customer identity access management, Kensho acquired Okta Authentication, User Management, Inbound Federation, and Multi-Factor Authentication. The implementation took around 7 months, with Kensho relying on Okta APIs to build custom tooling and automation, speeding up the process. The integration enabled Kensho to create a secure customer-facing market portal, providing simplified access to its solutions and S&P's data.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
SET Creative Ditches Google Vault for Datto Backupify
When Kienholz first started at SET, the staff was using Microsoft Outlook for email with no form of data backup. It became apparent that something needed to change as the staff was often burdened with trying to recover emails from departed employees. Kienholz transitioned the team to Google’s Gmail and implemented Google Vault for backup purposes. While SET employees quickly adjusted to Gmail, which many use for personal email, the same could not be said for Google Vault. “Unlike most Google products, Vault was not user friendly at all. It’s very hard to search for items. We never really figured out how to do a restore either,” explained Kienholz. Due to SET’s work with high-profile brands, projects often go through many rounds of revisions right down to the eleventh hour. This means that every bit of information - especially data living in project managers’ emails - is crucial to delivering clients a polished design at deadline.
Case Study
Infosys achieves a 5–7 percent effort reduction across projects
Infosys, a global leader in consulting, technology, and outsourcing solutions, was facing significant challenges in application development and maintenance due to its distributed teams, changing business priorities and the need to stay in alignment with customer needs. The company used a mix of open source, home-grown and third-party applications to support application development projects. However, challenges resulting from distributed teams using manual processes increased as the company grew. It became more and more important for Infosys to execute its projects efficiently, so they could improve quality, reduce defects and minimize delays.
Case Study
Arctic Wolf Envelops Teamworks with 24x7 Cybersecurity Protection and Comprehensive Visibility
Teamworks, a leading athlete engagement platform, faced rising cyberthreats and needed enhanced visibility into its network, servers, and laptops. With software developers connecting from all over the world, the company sought to improve its security posture and position itself for future growth. The company had a secure platform but recognized the need for a more proactive solution to identify gaps within its technology infrastructure. Data exfiltration and malicious access were top concerns, prompting the need for a comprehensive security upgrade.
Case Study
Sawback IT and Datto Save Client From a Costly Mistake
Ballistic Echo, a software development house, faced a critical challenge when human error led to the deletion of thousands of lines of unique code. This incident occurred before the code was pushed to source control, resulting in significant loss of time, revenue, and work. The previous file-level backup solution they used was slow and inefficient, making it nearly impossible to manually recreate the lost work. The need for a more reliable and efficient business continuity solution became evident to avoid such disasters in the future.
Case Study
Opal Helps Customers Shine Thanks to Datto
SP Flooring & Design Center faced a ransomware attack that encrypted and locked their files. The attack was initiated through a compromised service account set up by an outside vendor. The ransomware infection was isolated quickly, but there was a concern about the extent of the data at risk. The company had backups in place but was unsure of how much information was compromised. The situation required immediate action to prevent further damage and restore the affected data.
Case Study
Zapier Aggregates Multiple Analytics in a Single Dashboard with the New Relic Platform
Zapier, a company that enables non-technical users to push data between hundreds of web applications, was facing a challenge in automating and provisioning servers for optimal performance. The company's environment consisted of 50 Linux servers on the Amazon Elastic Compute Cloud (EC2), a Django application split across several servers, and a backend consisting of a dynamic number of celery task workers fed by messages published to a RabbitMQ cluster. They also maintained a number of internal web services on nginx in front of Gunicorn and Node.js processes. Redis handled simple key and value stores, with logging handled by Graylog2 and ElasticSearch. However, they realized that no level of automation would be sufficient without an effective monitoring solution in place. They needed a tool that could provide immediate alerts when something was breaking and could be easily implemented into their environment.