Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organizations concerned about ease and security of access, the following articles should explain why.

5 Key Takeaways from Our 2021 State of Zero Trust Security Report

How important is it to implement Zero Trust? We asked over 600 business and security leaders across North America, Asia Pacific (APAC), Europe, the Middle East, and Africa (EMEA)—and the overwhelming consensus is that it has become crucial. With the unprecedented shift to remote work, the adoption of new digital products and services, and the…

Inside T-Mobile’s Zero Trust Security Architecture

Never trust, always verify: it’s the Zero Trust principle that’s become intrinsic to how organizations build security. And modern identity sits at the heart of Zero Trust, making it easier and more efficient to assess, monitor, and grant access appropriately. Many companies are still beginning their Zero Trust journey, but T-Mobile is not your…

Okta Privileged Access: Unlocking Zero Trust Security at the Infrastructure Level

Every company that operates production software has compliance requirements. The vast majority of those organizations also carry significant infrastructure in the cloud and/or on-premises. And they all require a safe way to provide access to their developer workforce. Traditionally, there were two ways to achieve this: building a DIY system to…

2021 POV (Not Predictions) for Federal CISOs

First of all, this is not a list of 2021 predictions for security leaders serving in government agencies. I don’t think there’s much to predict in the way of envisioning how attackers are looking to compromise federal security systems and data. That is to say, we don’t have to envision anything, we can simply observe what happened in 2020 to know…

How to Build on Identity and Access Management with Zero Trust

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access…

Meet the Modern Computing Alliance: Here’s How We’ll Shape the Digital Future

In our near digital future, every organization will need flexible, customizable, and best-in-class cloud solutions. And, as we revealed in Okta’s annual Businesses at Work report, our 9400+ customer companies are embracing app diversity, unifying communications, and streamlining employee and customer experiences—without compromising on security.  …

Establishing Zero Trust Security, One Step at a Time

Yesterday, implementing Zero Trust security was important—today, it’s an imperative. Tomorrow, organizations that still haven’t rethought their security strategies  could be left in the dust. But there’s still a chance to get ahead without investing in all the infrastructure you need at once; once you start the journey, it’s easy to continuously…

One-Minute Webinar: How Okta Is Embracing Dynamic Work

Office spaces have always been designed to encourage productivity—and yet, no single desk arrangement has stood the test of time. Back in the 1950s, for example, the assembly lines at Ford inspired organizations to experiment with open floor plans. When that proved ineffective for white-collar workers, cubicles took hold in the late ‘80s and ‘90s…

Archive