1 / 10

Identity’s Role in your Zero Trust strategy

Identity’s Role in your Zero Trust strategy. The Old Approach to Security Relies on the Network Perimeter. TRUSTED. UNTRUSTED. Network Perimeter. Mobile and Cloud Have Dissolved the Traditional Perimeter. RESOURCES. Applications. Infrastructure. APIs. On Prem Apps. Cloud apps.

bcarlson
Download Presentation

Identity’s Role in your Zero Trust strategy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity’s Role in your Zero Trust strategy

  2. The Old Approach to Security Relies on the Network Perimeter TRUSTED UNTRUSTED Network Perimeter

  3. Mobile and Cloud Have Dissolved the Traditional Perimeter RESOURCES Applications Infrastructure APIs On Prem Apps Cloud apps Public Private On Prem Servers IaaS Employees Privileged Users Contractors • Partners Customers PEOPLE Result: We can no longer assume trust

  4. People Are the New Perimeter RESOURCES Applications Infrastructure APIs On Prem Apps Cloud apps Public Private On Prem Servers IaaS Contextual Access Employees Privileged Users • Contractors • Partners Customers PEOPLE

  5. When People are the Perimeter, Identity Becomes the Foundation of a Zero Trust Strategy

  6. Contextual Access Management App Context Network Context New IP Specified IP Zones Network anonymizers Device Context New device Managed device Location Context New city/state/country New geo-location Impossible travel Contextual Response Prompt for 2nd factor Allow/deny access User Context

  7. Modern Access Management The rightpeople have the right level of access to the right resources in the rightcontext that is assessed continuously Least Friction Possible

  8. Zero Trust Maturity Curve WORKFORCE IDENTITY PROTECTION • Risk-based access policies • Continuous and adaptive authentication and authorization • Frictionless access • Context-based access policies • Multiple factors deployed across user groups • Automated deprovisioning for leavers • Secure access to APIs • Single sign-on across employees, contractors, partners • Modern multi-factor authentication • Unified policies across apps and servers Stage 1: Fragmented identity Stage 3:Contextual Access Stage 4: Adaptive Workforce • Active Directory on-premises • No cloud integration • Passwords everywhere Stage 2: Unified IAM ADOPTION

  9. The Zero Trust journey starts with Identity There’s no silver bullet for Zero Trust Okta is the modern Zero Trust Platform

  10. “Okta was the foundation that could help us mature to a zero trust model.” -Melody Hildebrandt, Global CISO, 21st Century Fox There’s no silver bullet for Zero Trust The Zero Trust journey starts with Identity Okta is the modern Zero Trust Platform

More Related