Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organizations concerned about ease and security of access, the following articles should explain why.

Okta awarded the Palo Alto Networks 2023 Global Technology Partner Innovator of the Year

Okta is proud to be recognized as the Palo Alto Networks 2023 Global Technology Partner Innovator of the Year! These annual awards are presented to an elite group of Palo Alto Networks partners that, over the past 12 months, have excelled in one or more of the following areas: Performance: Bookings that partners initiate, the pipeline they build,…

It’s official: Zero Trust now favored by 96% of organizations

Zero Trust began as an abstract concept in 1994 and has evolved into an established security approach. More than 800 information security decision-makers around the world were surveyed to compile our latest report, The State of Zero Trust Security 2023. This report takes a detailed look at where Zero Trust adoption stands today, providing answers…

The fed gov needs Workforce Identity — three reasons why

Serving in public service puts you on the front lines of digital bad actors and cyber attacks. For this reason, the call to upskill, expand, and diversify the government’s workforce can be seen all over our social feeds this Cybersecurity Awareness Month. The Biden Administration considers this concept the most fundamental building block for…

Okta and Google Chrome Enterprise: Enhanced application protections with device assurance

As the digital landscape evolves, the need for robust security measures becomes increasingly critical. Organizations are constantly exploring innovative ways to ensure secure access to their systems and data. In this pursuit, Okta has taken a significant step forward by integrating its device assurance policies with Google's Device Trust Connector…

Okta’s enhanced smart card auth helps keep gov resources safe

Nearly two decades ago, the U.S. Homeland Security Presidential Directive 12 (HSPD-12) established a new identity policy for federal employees and contractors. Its goal was a strong, government-wide approach to secure both physical and logical access. Today, the Personal Identity Verification (PIV) and Common Access Card (CAC) standards are…

A summary of Okta’s FIPS compliance

Last updated Monday, March 10, 2025   Federal Information Processing Standards (FIPS) are security standards developed by the National Institute of Standards and Technology (NIST). For organizations to adhere to  FIPS compliance, the system or product must meet configuration standards and pass rigorous audits through regular third-party…

Archive