Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organizations concerned about ease and security of access, the following articles should explain why.

GitLab Goes All In on Zero Trust to Secure a Fully Remote Workforce

Only a few companies can claim they’re working on solutions so cutting edge that they’re still uncovering new ways their product is useful. GitLab, a complete DevOps platform and lifecycle tool, is one of these companies. What differentiates GitLab is its guiding philosophy: the company specializes in web-based, open-source code and DevOps…

Securing Remote Work Any Time, Anywhere, at Scale

Today, we’re excited to announce how Okta is working with CrowdStrike, Netskope, and Proofpoint to help organizations implement a modern, comprehensive, and integrated security strategy needed to protect today’s dynamic and remote working environments at scale. The COVID-19 pandemic has ignited a sudden shift to remote work, driving an…

Spring Cleaning for the Enterprise: Reduce Complexity, Cost, and Vendors

As they strive to meet the demands of today’s technical landscape, there’s a new challenge arising for the world’s largest organizations. These external demands can be summed up in 3 pressing imperatives that all enterprises must embrace: Deliver on modernize IT initiatives Create secure and seamless customer experiences Adopt a zero-trust…

The Path to Continuous Authentication: Solving the Best of Breed Problem

For years the network perimeter has been the foundation for controlling access to digital resources: kill the network, and the user no longer has access. Today’s cloud-first world has changed that, shifting the security perimeter to users and devices—and as companies continue to adopt best of breed solutions that enable their workforce, they need…

The Enterprise Strikes Back: A Star Wars Story

I spent many of my childhood weekends watching Episodes IV-VI of Star Wars, the world's most famous “space opera.” Recently, it occurred to me that if the Galactic Empire had adopted a Zero Trust security model, it might have prevailed over Skywalker and the Rebels. Specifically, one could argue that the destruction of the Death Star was caused by…

5 Tenets of a Robust Security Infrastructure

The global number of cyber-attacks reached an all-time high last year and shows no indication of slowing down. In fact, cyber-attacks and data fraud are two of the top 10 global risks for this upcoming decade according to the World Economic Forum (WEF) Global Risk Report. The National Counterintelligence and Security Center (NCSC) recently…

What the Jeff Bezos WhatsApp Hack Means for App Security

By now the whole world has heard that Jeff Bezos’s WhatsApp was hacked, leading to the theft, or exfiltration, of gigabytes of personal data. We don’t know what data the hackers stole, as the attackers, once finished with their operation, quickly deleted their tracks, destroying almost all of the tell-tale signs that they breached the phone. In…

Assessing Where Your Organization Lies on the Zero Trust Maturity Curve

Most of us are now familiar with the term “Zero Trust”, seeing it emblazoned on many a booth and bus at security conferences throughout the year. The term has certainly reached buzzword status, and with good reason: today, security leaders recognize more than ever the need to move away from a perimeter-oriented approach to security. But putting a…

Okta + VMware Use Cases

Following the announcement of our extended integrations with VMware last week, we thought you might enjoy learning about some of the common projects we see joint Okta and VMware customers undertake, and how the existing integration and these recent improvements can help unlock more value for our customers. Okta and VMware work together to help…

Archive