Looking for Okta Logos?

You can find all the media assets you need as part of our press room.

Download Media Assets

Okta Security: Technical White Paper

Download Now

In the 1980s and 1990s, business applications and data were largely confined within and protected by a local area network (LAN). Securing enterprise information technology at the time consisted of building a castle (the company) with high walls, a deep moat (the firewall), and two points of access to applications: through the front gate (physically walking in the door) or through a secret tunnel such as a virtual private network (VPN) That was it. The 2000s introduced a significant change. Download now to learn how the shift to the cloud is changing how companies think about their IT infrastructure, security processes, and what they must do to manage it.

Download the White Paper

All Fields Required