Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organizations concerned about ease and security of access, the following articles should explain why.

Secure User Identities in Your Zoom Calls — Authenticated by Okta

Today’s workforce is dynamic with employees working from the office, home, and other remote locations across the world. For organizations, Zoom has increasingly become the de facto solution for video conferencing, connecting them to employees and customers. But the shift to remote and hybrid work has left IT and security teams with a new challenge…

How Identity Serves the Total Army Zero Trust Strategy

In support of the U.S. Department of Defense (DoD) Zero Trust Strategy, the Army is developing a service-specific Zero Trust Strategy, tentatively named “Knights Watch”. To move towards an integrated security architecture, the Army will divest from aging infrastructure, develop trained staff, and lean on industry partners.  Similar to previous…

Zero Trust Secures Nonprofits’ Links to Clients, Staff, and Volunteers

Every week, reports of cyberattacks hit the news. While these headlines primarily focus on for-profit businesses, nonprofits are not immune. In 2021, U.S. businesses and public entities suffered 26,074 incidents, with a total cost of close to $2.6 billion, according to the U.S. Government Accountability Office.  Nonprofits make attractive targets…

Introducing Okta's Identity Adoption Model for Zero Trust

While the term “Zero Trust” is ubiquitous enough to feel like a buzzword, adoption of the security framework is not as widespread as you might think.  The security industry has been discussing the reality of the shifting perimeter for nearly two decades, with origins back to the Jericho Forum, an international group working to define and promote…

An Exploration of Open Identity Standards

You may be curious to find out how products and solutions are developed, implemented, adopted, and operated. The history of standards is a fascinating place to start.  Standards are well-defined, abstract interfaces that enable industries to develop and thrive. These interfaces ensure ecosystem players with different roles can work together and…

Governments are Ahead of the Curve With Zero Trust Deployment

Government institutions are prime cyber targets. In fact, according to a 2021 report from Auth0, more than 10 percent of registration attempts for online government services represent threat actors trying to create fake accounts. Around the world, public policymakers and technology leaders have chosen to strengthen their security posture by…

5 Important Insights From Our 2022 State of Zero Trust Report

What a difference four years makes.  Since launching our first State of Zero Trust report in 2019, we’ve been saying that the framework represents the future of security. This year, Zero Trust adoption reached a tipping point.  In 2019, many organizations that we surveyed acknowledged that Zero Trust was important, but just 16% had invested in…

Archive