Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organizations concerned about ease and security of access, the following articles should explain why.

How to Build on Identity and Access Management with Zero Trust

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access…

Meet the Modern Computing Alliance: Here’s How We’ll Shape the Digital Future

In our near digital future, every organization will need flexible, customizable, and best-in-class cloud solutions. And, as we revealed in Okta’s annual Businesses at Work report, our 9400+ customer companies are embracing app diversity, unifying communications, and streamlining employee and customer experiences—without compromising on security.  …

Establishing Zero Trust Security, One Step at a Time

Yesterday, implementing Zero Trust security was important—today, it’s an imperative. Tomorrow, organizations that still haven’t rethought their security strategies  could be left in the dust. But there’s still a chance to get ahead without investing in all the infrastructure you need at once; once you start the journey, it’s easy to continuously…

One-Minute Webinar: How Okta Is Embracing Dynamic Work

Office spaces have always been designed to encourage productivity—and yet, no single desk arrangement has stood the test of time. Back in the 1950s, for example, the assembly lines at Ford inspired organizations to experiment with open floor plans. When that proved ineffective for white-collar workers, cubicles took hold in the late ‘80s and ‘90s…

Leading Companies Are Adopting Zero Trust—Here’s How

Let’s go back in time a few years. Businesses operate largely within the boundaries of their office walls, and security networks function under the premise that there are ‘trusted’ internal users, and ‘untrusted’ external ones. Now, as more employees than ever are accessing their corporate resources remotely, with their own devices, this premise…

The Dogfooding Chronicles: Work From Home Edition

The Dogfooding Chronicles are BACK! And, like everyone else, we’re dogfooding from home these days. The move home has been a period of transition for everyone, but the one thing that wasn’t difficult? Getting the Okta workforce home and working—very quickly. And there’s no better Oktanaut to tell that story than our guest blogger Christopher Flynn…

GitLab Goes All In on Zero Trust to Secure a Fully Remote Workforce

Only a few companies can claim they’re working on solutions so cutting edge that they’re still uncovering new ways their product is useful. GitLab, a complete DevOps platform and lifecycle tool, is one of these companies. What differentiates GitLab is its guiding philosophy: the company specializes in web-based, open-source code and DevOps…

Securing Remote Work Any Time, Anywhere, at Scale

Today, we’re excited to announce how Okta is working with CrowdStrike, Netskope, and Proofpoint to help organizations implement a modern, comprehensive, and integrated security strategy needed to protect today’s dynamic and remote working environments at scale. The COVID-19 pandemic has ignited a sudden shift to remote work, driving an…

Spring Cleaning for the Enterprise: Reduce Complexity, Cost, and Vendors

As they strive to meet the demands of today’s technical landscape, there’s a new challenge arising for the world’s largest organizations. These external demands can be summed up in 3 pressing imperatives that all enterprises must embrace: Deliver on modernize IT initiatives Create secure and seamless customer experiences Adopt a zero-trust…

Archive