Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organizations concerned about ease and security of access, the following articles should explain why.

Zero Trust: Past, Present, and Future

Prior to the Zero Trust era Over the last decade, we’ve experienced three megatrends in action: mobile, cloud, and software-as-a-service (SaaS). These megatrends have redefined how we work, conduct business, and consume information. According to Gartner, global end-user spending on public cloud services is expected to exceed $480 billion in 2022…

Okta Puts Customers First—Here’s How

At Okta, our customers are our pride, our purpose, and our priority. When they succeed, we succeed, and when they grow, so do we. We have gained our status as the world’s leading independent identity provider by working with a global community of brilliant customers to deploy more complex identity scenarios than anyone else—and we’re learning more…

Okta Is Proud to Participate in the New CrowdXDR Alliance

October is Cyber Security Awareness Month, and the past few weeks have accelerated this awareness into mainstream consciousness. Facebook experienced an outage, Twitch suffered a major data breach, and Syniverse quietly revealed a 5-year data breach. It has become starkly evident that organizations need to invest in cyber security solutions, but…

Helping the Public Sector Adopt a Zero Trust Framework: Okta Joins the AWS Summit

Earlier this year I wrote that, in 2021, government security leaders need to adopt a true Zero Trust framework—an approach that ensures the right people have the right level of access, to the right resources, in the right context. And that access must be assessed continuously—all without adding friction for the user. Meanwhile, it should add as…

5 Key Takeaways from Our 2021 State of Zero Trust Security Report

How important is it to implement Zero Trust? We asked over 600 business and security leaders across North America, Asia Pacific (APAC), Europe, the Middle East, and Africa (EMEA)—and the overwhelming consensus is that it has become crucial. With the unprecedented shift to remote work, the adoption of new digital products and services, and the…

Inside T-Mobile’s Zero Trust Security Architecture

Never trust, always verify: it’s the Zero Trust principle that’s become intrinsic to how organizations build security. And modern identity sits at the heart of Zero Trust, making it easier and more efficient to assess, monitor, and grant access appropriately. Many companies are still beginning their Zero Trust journey, but T-Mobile is not your…

Okta Privileged Access: Unlocking Zero Trust Security at the Infrastructure Level

Every company that operates production software has compliance requirements. The vast majority of those organizations also carry significant infrastructure in the cloud and/or on-premises. And they all require a safe way to provide access to their developer workforce. Traditionally, there were two ways to achieve this: building a DIY system to…

2021 POV (Not Predictions) for Federal CISOs

First of all, this is not a list of 2021 predictions for security leaders serving in government agencies. I don’t think there’s much to predict in the way of envisioning how attackers are looking to compromise federal security systems and data. That is to say, we don’t have to envision anything, we can simply observe what happened in 2020 to know…

How to Build on Identity and Access Management with Zero Trust

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access…

Archive