Trust at Work

What is Zero Trust Security?

Zero Trust is a security framework based on the belief that every user, device, and IP address accessing a resource is a threat until proven otherwise. Under the concept of “never trust, always verify,” it requires that security teams implement strict access controls and verify anything that tries to connect to an enterprise’s network. Coined in…

FREE NOW: Making remote work simple and secure for 1,300 employees with Okta

Can you think of a moment before 2020 when the words “in these unprecedented times” have been more widely used? Organisations all over the world are pushing their creativity to the limit to keep “business as usual” under very unusual circumstances. The coronavirus situation has impacted companies of every size, including FREE NOW, the multiservice…

What is Hybrid IT?

Hybrid IT is a deployment model that combines solutions of different kinds to form the overall IT infrastructure. Most of the time, hybrid IT combines solutions hosted on-premises with cloud services. Hybrid IT is considered the most popular deployment model (especially in larger organizations). Almost 70% of large enterprises use this type of…

What Is Data Security?

Data security is the protection of digital data and accounts in accordance with laws and industry standards in order to mitigate risks and repel attackers. It encompasses business data, employee information, and customer and user data. If that sounds multifaceted, it is: putting data security into practice isn’t one size fits all. With companies…

Adopting a Remote Work Strategy? We’re Here to Help

Nothing is more important to us than the health and safety of our community, and we know many organizations feel the same. In response to the continually developing COVID-19 crisis, we’re seeing companies all over the world take various steps to help protect their employees. For Okta and several other organizations, part of this strategy includes…

Putting the 8 Principles of Infrastructure Access into Practice

IT and security teams want to protect sensitive data and systems from online threats to preserve both the bottom line and their organization’s reputation. This means securing access to cloud and on-prem infrastructure. But legacy techniques have largely failed users and IT administrators in this regard—it’s time for a modern approach. Why have…

Archive