Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organizations concerned about ease and security of access, the following articles should explain why.

One-Minute Webinar: How Okta Is Embracing Dynamic Work

Office spaces have always been designed to encourage productivity—and yet, no single desk arrangement has stood the test of time. Back in the 1950s, for example, the assembly lines at Ford inspired organizations to experiment with open floor plans. When that proved ineffective for white-collar workers, cubicles took hold in the late ‘80s and ‘90s…

Leading Companies Are Adopting Zero Trust—Here’s How

Let’s go back in time a few years. Businesses operate largely within the boundaries of their office walls, and security networks function under the premise that there are ‘trusted’ internal users, and ‘untrusted’ external ones. Now, as more employees than ever are accessing their corporate resources remotely, with their own devices, this premise…

The Dogfooding Chronicles: Work From Home Edition

The Dogfooding Chronicles are BACK! And, like everyone else, we’re dogfooding from home these days. The move home has been a period of transition for everyone, but the one thing that wasn’t difficult? Getting the Okta workforce home and working—very quickly. And there’s no better Oktanaut to tell that story than our guest blogger Christopher Flynn…

GitLab Goes All In on Zero Trust to Secure a Fully Remote Workforce

Only a few companies can claim they’re working on solutions so cutting edge that they’re still uncovering new ways their product is useful. GitLab, a complete DevOps platform and lifecycle tool, is one of these companies. What differentiates GitLab is its guiding philosophy: the company specializes in web-based, open-source code and DevOps…

Securing Remote Work Any Time, Anywhere, at Scale

Today, we’re excited to announce how Okta is working with CrowdStrike, Netskope, and Proofpoint to help organizations implement a modern, comprehensive, and integrated security strategy needed to protect today’s dynamic and remote working environments at scale. The COVID-19 pandemic has ignited a sudden shift to remote work, driving an…

Spring Cleaning for the Enterprise: Reduce Complexity, Cost, and Vendors

As they strive to meet the demands of today’s technical landscape, there’s a new challenge arising for the world’s largest organizations. These external demands can be summed up in 3 pressing imperatives that all enterprises must embrace: Deliver on modernize IT initiatives Create secure and seamless customer experiences Adopt a zero-trust…

The Path to Continuous Authentication: Solving the Best of Breed Problem

For years the network perimeter has been the foundation for controlling access to digital resources: kill the network, and the user no longer has access. Today’s cloud-first world has changed that, shifting the security perimeter to users and devices—and as companies continue to adopt best of breed solutions that enable their workforce, they need…

The Enterprise Strikes Back: A Star Wars Story

I spent many of my childhood weekends watching Episodes IV-VI of Star Wars, the world's most famous “space opera.” Recently, it occurred to me that if the Galactic Empire had adopted a Zero Trust security model, it might have prevailed over Skywalker and the Rebels. Specifically, one could argue that the destruction of the Death Star was caused by…

5 Tenets of a Robust Security Infrastructure

The global number of cyber-attacks reached an all-time high last year and shows no indication of slowing down. In fact, cyber-attacks and data fraud are two of the top 10 global risks for this upcoming decade according to the World Economic Forum (WEF) Global Risk Report. The National Counterintelligence and Security Center (NCSC) recently…

Archive