1 / 10

Identity's Role in Your Zero Trust Strategy: Modernizing Security with Okta

Learn how the traditional network perimeter approach to security has evolved with the dissolution of boundaries by mobile and cloud technologies. Understand why people are now the new perimeter, making identity the foundation of a Zero Trust strategy. Explore contextual access management, modern access control, and workforce identity protection for building a mature Zero Trust approach. Start your Zero Trust journey with Okta, the modern platform for securing identities.

bcarlson
Download Presentation

Identity's Role in Your Zero Trust Strategy: Modernizing Security with Okta

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity’s Role in your Zero Trust strategy

  2. The Old Approach to Security Relies on the Network Perimeter TRUSTED UNTRUSTED Network Perimeter

  3. Mobile and Cloud Have Dissolved the Traditional Perimeter RESOURCES Applications Infrastructure APIs On Prem Apps Cloud apps Public Private On Prem Servers IaaS Employees Privileged Users Contractors • Partners Customers PEOPLE Result: We can no longer assume trust

  4. People Are the New Perimeter RESOURCES Applications Infrastructure APIs On Prem Apps Cloud apps Public Private On Prem Servers IaaS Contextual Access Employees Privileged Users • Contractors • Partners Customers PEOPLE

  5. When People are the Perimeter, Identity Becomes the Foundation of a Zero Trust Strategy

  6. Contextual Access Management App Context Network Context New IP Specified IP Zones Network anonymizers Device Context New device Managed device Location Context New city/state/country New geo-location Impossible travel Contextual Response Prompt for 2nd factor Allow/deny access User Context

  7. Modern Access Management The rightpeople have the right level of access to the right resources in the rightcontext that is assessed continuously Least Friction Possible

  8. Zero Trust Maturity Curve WORKFORCE IDENTITY PROTECTION • Risk-based access policies • Continuous and adaptive authentication and authorization • Frictionless access • Context-based access policies • Multiple factors deployed across user groups • Automated deprovisioning for leavers • Secure access to APIs • Single sign-on across employees, contractors, partners • Modern multi-factor authentication • Unified policies across apps and servers Stage 1: Fragmented identity Stage 3:Contextual Access Stage 4: Adaptive Workforce • Active Directory on-premises • No cloud integration • Passwords everywhere Stage 2: Unified IAM ADOPTION

  9. The Zero Trust journey starts with Identity There’s no silver bullet for Zero Trust Okta is the modern Zero Trust Platform

  10. “Okta was the foundation that could help us mature to a zero trust model.” -Melody Hildebrandt, Global CISO, 21st Century Fox There’s no silver bullet for Zero Trust The Zero Trust journey starts with Identity Okta is the modern Zero Trust Platform

More Related