Author: wpAdmin

  • Security’s First Pillar: Identity Modernization, DHS, and the Government’s Adoption of Zero Trust

    Security’s First Pillar: Identity Modernization, DHS, and the Government’s Adoption of Zero Trust

    Security’s First Pillar: Identity Modernization, DHS, and the Government’s Adoption of Zero Trust Zero Trust is not a specific tool, but a concept that focuses security measures on devices and users rather than on the traditional network perimeter. The Biden administration’s Executive Order 14028, “Ensuring the Nation’s Cybersecurity”3 provides guidance for agencies in implementing a…

  • Top Organizations Are Automating Identity With Okta Workflows

    Top Organizations Are Automating Identity With Okta Workflows More than ever, IT teams need automation to effectively manage their increasingly complex identity tasks—especially as their networks of end-users grow. And without the time or money to build these capabilities in-house, many are turning to modern, low- to no-code solutions. Check out the infographic below to…

  • A Comprehensive Guide for Your Customer Identity Maturity Journey

    A Comprehensive Guide for Your Customer Identity Maturity Journey As the leader in identity and access management (IAM), Okta has worked with thousands of companies to achieve their security and usability goals. We’ve learned that no matter how far along each company is on their identity journey, there’s a common set of challenges they face…

  • The State of Zero Trust Security 2022

    The State of Zero Trust Security 2022 Zero Trust adoption has reached a tipping point. While the security framework has steadily gained traction over the past several years, adoption rates passed a critical threshold in 2022. More than half of the organizations surveyed (55%) for Okta’s annual report on the framework have a Zero Trust…

  • Anatomy of Identity-Based Attacks

    Anatomy of Identity-Based Attacks As a security practitioner, protecting your organization’s data is your number one priority. Yet with the explosion of the mobile and hybrid workforce, SaaS adoption, and application modernization, new attack methodologies arise all the time. And even with a Zero Trust Architecture enforcing principles of least privilege, security teams still need…

  • Build vs. Buy: Customer Identity and Access Management

    Build vs. Buy: Customer Identity and Access Management Every team building a new web or mobile application faces a choice: build the entire application in-house or selectively use out-of-the-box services to make the job easier and faster. There’s an attraction to building your own identity solution if you have the available time, resources, and expertise.…

  • How to Protect Your Organization from Identity-Based Attacks

    How to Protect Your Organization from Identity-Based Attacks Many organizations understand that there’s a link between identity and security, but few fully grasp how foundational identity is to a modern security strategy. Organizations with gaps in their identity security are significantly more at risk of experiencing a compromise or breach. Find out what steps you…

  • Forrester Report: The Definition of Modern Zero Trust

    Forrester Report: The Definition of Modern Zero Trust It’s been over a decade since Forrester created the Zero Trust Model of information security. Since then, marketing hype has co-opted the term, creating confusion and misunderstanding about the actual definition of Zero Trust, thus driving skepticism about its practical, real-world implementation. Read this report to get…

  • Now Tech: Customer Identity And Access Management, Q1 2022

    Now Tech: Customer Identity And Access Management, Q1 2022 You can use customer identity and access management (CIAM) solutions to register, profile, authenticate, and provide customers with self-service. CIAM solutions play a critical role in supporting digital customer journeys through onboarding, authentication, profile and loyalty program management, and offboarding. But to realize these benefits, you’ll…

  • Why Customer Identity?

    Why Customer Identity? In the first few months of 2020, digital channels went from a “nice to have” to a “must have” for countless businesses; for many, digital channels suddenly became the only way to engage with customers. But as the old saying goes, “haste makes waste,” and the consequences of a rushed digital transformation…