110 likes | 129 Views
Identity’s Role in your Zero Trust strategy. The Old Approach to Security Relies on the Network Perimeter. TRUSTED. UNTRUSTED. Network Perimeter. Mobile and Cloud Have Dissolved the Traditional Perimeter. RESOURCES. Applications. Infrastructure. APIs. On Prem Apps. Cloud apps.
E N D
The Old Approach to Security Relies on the Network Perimeter TRUSTED UNTRUSTED Network Perimeter
Mobile and Cloud Have Dissolved the Traditional Perimeter RESOURCES Applications Infrastructure APIs On Prem Apps Cloud apps Public Private On Prem Servers IaaS Employees Privileged Users Contractors • Partners Customers PEOPLE Result: We can no longer assume trust
People Are the New Perimeter RESOURCES Applications Infrastructure APIs On Prem Apps Cloud apps Public Private On Prem Servers IaaS Contextual Access Employees Privileged Users • Contractors • Partners Customers PEOPLE
When People are the Perimeter, Identity Becomes the Foundation of a Zero Trust Strategy
Contextual Access Management App Context Network Context New IP Specified IP Zones Network anonymizers Device Context New device Managed device Location Context New city/state/country New geo-location Impossible travel Contextual Response Prompt for 2nd factor Allow/deny access User Context
Modern Access Management The rightpeople have the right level of access to the right resources in the rightcontext that is assessed continuously Least Friction Possible
Zero Trust Maturity Curve WORKFORCE IDENTITY PROTECTION • Risk-based access policies • Continuous and adaptive authentication and authorization • Frictionless access • Context-based access policies • Multiple factors deployed across user groups • Automated deprovisioning for leavers • Secure access to APIs • Single sign-on across employees, contractors, partners • Modern multi-factor authentication • Unified policies across apps and servers Stage 1: Fragmented identity Stage 3:Contextual Access Stage 4: Adaptive Workforce • Active Directory on-premises • No cloud integration • Passwords everywhere Stage 2: Unified IAM ADOPTION
The Zero Trust journey starts with Identity There’s no silver bullet for Zero Trust Okta is the modern Zero Trust Platform
“Okta was the foundation that could help us mature to a zero trust model.” -Melody Hildebrandt, Global CISO, 21st Century Fox There’s no silver bullet for Zero Trust The Zero Trust journey starts with Identity Okta is the modern Zero Trust Platform