Adapt to the Cloud Operating Model Part 3: Taking the DevSecOps Journey

This is the third and final blog post in our Adapt to the Cloud Operating Model series.  With any organizational change that impacts people, process, and technology, it’s best to take it in stride. When talking with customers about their Zero Trust security initiatives, an analogy I often use is: “if Google’s BeyondCorp is the peak of Mt. Everest,…

Adapt to the Cloud Operating Model Part 2: The Critical Role of Identity

This is the second blog post in our Adapt to the Cloud Operating Model series.  Identity is at the heart of any organization; it forms the foundation for a productive and secure workforce, and it enables digital teams to build lasting and scalable customer experiences. In the cloud, identity isn’t just about people—it covers the full spectrum of…

One-Minute Webinar: Driving Scale in the Cloud With Okta for Infrastructure

We’re always talking about how every business has had to become a tech company in order to operate efficiently while delivering to customers worldwide. But what we don’t always talk about is that this shift puts a ton of pressure on developers, operations, and security teams. It’s up to developers to build the software that your internal and…

Announcing Okta SSO for HashiCorp Terraform Cloud for Business

Companies of all kinds and sizes are adopting more cloud infrastructure and employing DevOps programs to streamline the delivery and operations of software. In doing so, they begin to foster a culture of automation that spans people, process, and technology. As a leading provider of open source technologies across the infrastructure landscape,…

To Secure DevOps, We Need to Shift Identity Left

You know it, we know it: DevOps is a core function for any company that wants to deliver exceptional digital products to its customers. But as customers become used to rapid updates and new features from the applications they use every day, there’s an added pressure for your DevOps team to be continually innovating so that your business can do the…

Adapt to the Cloud Operating Model Part 1: Velocity as the Business Driver

Every company is becoming a technology company. You’ve heard that before. We’ve said that before. The glaring truth behind this statement is that technology is the only way to remain competitive in today’s fast-paced landscape. For some organizations, this means embracing technology; for others, this means leading with it. Either way, the primary…

SSH is Dead. Long Live SSH: One Million SSH Logins with Okta. Zero SSH Keys.

As the great Mark Twain once wrote in response to reading his own obituary in May of 1897, “reports of my death have been greatly exaggerated.” Fast forward nearly a hundred years to 1995, and a Finnish computer scientist named Tatu Ylönen created a secure transport protocol known simply as Secure Shell (SSH). What do these things have to do with…

Adapting to the Cloud Operating Model: Using Okta + HashiCorp to Automate Identity + Infrastructure as Code

Companies who employ DevOps programs have a goal in mind – to enable velocity at scale. Getting software out the door faster and more effectively is becoming critical to remain competitive in today’s fast-paced technology landscape. When speed is the name of the game, automation is key. Without the right guard rails, however, automation can be…

Shift Identity Left: Secure DevOps Automation with Okta

To keep up with the rapid pace of innovation, organizations of all kinds and sizes are adopting DevOps practices to better automate the delivery and operations of software in the cloud. A cultural phenomenon that impacts people and process as much as it does technology, DevOps brings teams together with the goal of removing barriers – the…

Mise en pratique des 8 principes de la gestion des accès à l'infrastructure

Les équipes IT et sécurité doivent protéger systèmes et données sensibles contre les cybermenaces, pour préserver à la fois la santé financière et la réputation de leur entreprise. Leur tâche implique en premier lieu de sécuriser l'accès à l'infrastructure cloud et on-premise. Or, les méthodes classiques ont montré leurs limites, tant à l'égard…