Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organisations concerned about ease and security of access, the following articles should explain why.

Introducing the Okta Secure Identity Commitment

Earlier today, Okta CEO Todd McKinnon sent the following email to Okta employees.  Hi everyone, Last month Okta celebrated its 15th birthday. After reflecting on this milestone, I’m incredibly proud of the progress we’ve made together and the strides we’ve taken to establish Okta as an iconic company. We power every identity use case, we support…

Secure User Identities in Your Zoom Calls — Authenticated by Okta

Today’s workforce is dynamic with employees working from the office, home, and other remote locations across the world. For organisations, Zoom has increasingly become the de facto solution for video conferencing, connecting them to employees and customers. But the shift to remote and hybrid work has left IT and security teams with a new challenge…

Why You Can’t Have Zero Trust Security Without Identity

Surging cybercrime is a major concern for every organisation today. As employee expectations for more flexible working continue to grow, IT and Security leaders face immense pressures to protect their hybrid workforce as they move beyond the traditional network perimeter. Yet, with cyberattacks having risen by 50% in the last year alone, 61% of…

Zero Trust in Europe: Special Considerations in an Evolving Regulatory Climate

In this blog we explore some of the special regulatory considerations organisations should understand when adopting a Zero Trust strategy in Europe. As enterprise technology ecosystems evolve to include a growing number of cloud resources, mobile and employee-owned devices, and digital business processes, the traditional approaches to securing…

What is the Role of IAM in Cloud Computing?

The post-Covid-19 business world doesn’t work without cloud computing, and cloud computing doesn’t work without IAM.  As the world reacted to the global pandemic back in 2020, organisations turned to technology to enable their workforce and respond rapidly to changing customer demands. Digital transformation roadmaps, originally plotted over…

What is Ransomware-as-a-Service (RaaS)?

In this post we briefly explore the emerging threat of Ransomware-as-a-Service (RaaS) and suggest how you can protect your organisation. As reports of ransomware attacks on vulnerable IT networks continue to rise, it seems as though cybercriminals are working harder than ever before. In 2020 alone, companies across the UK reported 5.9 million new…

Archive