Zero Trust

Zero Trust— the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check—is a core concept for Okta. For organizations concerned about ease and security of access, the following articles should explain why.

Shift Identity Left: Secure DevOps Automation with Okta

To keep up with the rapid pace of innovation, organizations of all kinds and sizes are adopting DevOps practices to better automate the delivery and operations of software in the cloud. A cultural phenomenon that impacts people and process as much as it does technology, DevOps brings teams together with the goal of removing barriers – the…

Dogfooding Chronicles: How Okta uses Okta

In this episode of the Dogfooding Chronicles, we want to go into the basics, and navigate you through Okta IT’s own use cases at a high level, stepping you through our environment and processes. We want to orient you to understand why we make the technology choices that we do. Our hope? You find this information so helpful, you’ll use some of it…

How Okta and BetterCloud secure your SaaS user interactions

The rise of user mobility and SaaS application adoption have drastically changed the landscape for access and security: more people are accessing more resources from more locations and more devices. Organizations must ensure that all users around the globe — whether remote employees, customers, partners, or contractors — can securely access data…

A Path to Achieving Network Security ZEN

As new philosophies around network security arise alongside ongoing technological advances, forward-thinking companies are changing the way users interact with—and feel about—network security as part of their work day. People are the new perimeter Up until recently, network security relied upon a network perimeter—anything inside the perimeter…

CSA Summit Panelists Talk Disruptive Technologies at RSA19

At RSAC19, The Cloud Security Alliance hosted a discussion titled, “The Approaching Decade of Disruptive Technologies,” featuring security leaders from Duo, Centrify, Onapsis, and Okta’s own Executive Director of Cybersecurity Strategy, Marc Rogers. IOActive CEO Jennifer Steffens led the session with the intent of discussing what disruptive…

Using SIEM and Identity to Protect Against Data Breaches

“We are what we repeatedly do“ is a common paraphrase of Aristotle—though if he were around today, his sentiment might be more like “we are what we search, click, or connect to.” As security professionals well know, there’s a lot to learn from how we use technology. The interactions between users, applications, networks, devices, and APIs all…

Understanding FIDO Standards: Your Go-To Guide

FIDO is an acronym that comes from the Latin fido, meaning ‘to trust’, which was popularised by Abraham Lincoln—who borrowed it to name his dog. It’s a fitting name for man’s best friend, and just as appropriate in the security world, where trust is key. A more technical reference, FIDO (Fast IDentity Online), emerged in 2012 and is backed by a…

One-Minute Webinar: Zero Trust in Practice

Too busy to watch the Zero Trust in Practice webinar? Don’t worry—we’ve got you covered. There’s a lot of hype around Zero Trust security, but it’s proving to be more than just theory. Trust used to be a binary decision determined by the network, but as organizations move to mobile and cloud based services, the perimeter as we knew it has…

4 Reasons Top CISOs Trust Okta with Their Toughest Security Challenges

With Gartner predicting that 80% of companies will close their data centres completely by 2025, it’s clear that companies are embracing cloud-based infrastructure. How we work has changed; employees are increasingly mobile, and our IT environments are far more complex. As attack surfaces broaden and incidents of credential theft skyrocket, most…

Archive