Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Nick Fisher

Nick Fisher

Product Marketing Manager, Security

Nick Fisher is a Group Product Marketing Manager of security products at Okta, with over a decade of experience in enterprise SaaS and modern security solutions. Previously, Nick led product marketing at Lookout, where he helped develop the enterprise mobile security market. Nick lives in San Francisco and holds an MBA from Columbia University.

How SaaS and Cloud Storage Is Shifting Your Security Perimeter

Modern organizations have embraced Software as a Service (SaaS) in a big way—and for good reason. Cost savings, increased efficiency, and boosted productivity are just some of the benefits of outsourcing IT solutions like email, app hosting, and data storage to independent third parties. In fact, solutions offered by cloud...

The Evolution of Zero Trust: Next Gen Access

The Zero Trust security framework was first developed by John Kindervag in 2009 while he was at Forrester Research . Zero Trust challenged the traditional security model of a firewall forming a perimeter between a trusted internal network and an untrusted external one. This security approach breaks down if...

A Brief History of Zero Trust Security

The Forrester Zero Trust model, which has been around since 2009, argues that organizations should regard all network traffic as untrusted, regardless of where it’s coming from. The idea of a trusted internal perimeter leaves the organization at risk if that perimeter is compromised or an insider turns...

Two Months In: How Are Companies Being Impacted by the GDPR?

Online data privacy has always been a controversial topic. The fact that users store data with third parties has demanded increased transparency on how these platforms actually store and process personal data. Data breaches resulting in compromised personal information have added fuel to the fire, proving that privacy concerns...

Replace RSA SecurID with Modern MFA

Defense in depth, the coordinated use of multiple security layers to protect system and data integrity, is a multi-layered strategic approach which is deployed to minimize the risk of compromise. The basic premise is that if one security countermeasure is defeated, there is another to ensure your systems remain secure....

What is Continuous Authentication?

Authentication is undoubtedly one of the most crucial aspects of cybersecurity today, but our understanding of how to verify users and their actions has been largely unchanged for decades. It always works the same: the user provides something they know (password), have (ID), or are (fingerprint) and...