188875 secure

Zero trust: why identity drives next gen access

30th September 2020 | Netherlands | Information Security


Okta Virtual Roundtable - 30th September 2020 1

zero trust: why identity drives next-gen access


 As organisations move to mobile and cloud based services, they are moving away from traditional perimeter-focused approaches to security. Resources are focused on enabling access for all users (employees, contractors, partners, etc.) regardless of their location, device or network.  Zero Trust is quickly becoming the dominant security model for the cloud, shifting the perimeter from the network to the people and devices that make up a modern workforce. As a model with many moving parts, the immediate question is: where to start? This discussion will focus on: The full Zero Trust reference architecture and steps to get there and why Identity is the foundational layer to build contextual access controls.

Discussion Topics Include:

- What are the security challenges of cloud and mobile adoption?

- With the need to manage access across a variety of users, networks and devices, can we still enforce security on a single network perimeter, and what are the alternatives?

- How do you balance security – ensuring the right people have access to the right resources at the right time – while maintaining a good end user experience?

- How do you manage the often siloed identities and credentials created as a result of increased adoption of disparate tools and systems employees are demanding?

- With more than 80% of today’s data breaches are caused by compromised or poor credentials in attacks like phishing, credential stuffing, password spray. Organizations can't always trust users based just on a username/passwords. How can organisations verify trust in the user and the device before granting access?


Whitepapers, Analyst Reports & Tools

Getting Started with Zero Trust: Never trust, always verify

Zero Trust security throws away the idea that we should have a “trusted” internal network and an “untrusted” external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees, partners, contractors, etc.) regardless of their location, device or network. There is no silver bullet when it comes to achieving a Zero Trust security architecture, but identity and access management is the core technology that organisations should start with on their Zero Trust journeys.

Here, we’ll explore the shifts in the security landscape that led to the creation of Zero Trust, what the Zero Trust Extended Ecosystem (ZTX) framework looks like today, and how organisations can utilise Okta as the foundation for a successful Zero Trust program now, and in the future.

Identity & Zero Trust Assessment Tool

As IT and security professionals, we love the idea of Zero Trust: the right users get the right amount of access, to the right resources and at the right time. But putting theory into practice isn’t always so simple. Do I have to buy all new tools, or completely rearchitect my stack? Is there a way to go from zero to Zero Trust with limited resources? By starting with identity as your foundation, you can tackle a key security challenge and get your organization on the road to Zero Trust quickly and easily.

The Forrester Wave™: Zero Trust eXtended Ecosystem

Analyst firm Forrester Research has named Okta a Leader in its report, The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019. Okta earned the highest possible score across half of the evaluation criteria including “network security,” “people/workforce security,” “automation and orchestration,” “manageability and usability,” “ZTX vision and strategy,” “ZTX advocacy,” “customers investing in portfolio,” and “portfolio growth rate.” 


The Maturity of Zero Trust Across Organizations

Zero Trust has been a hot topic for some time now, and many say it’s even starting to enter buzzword territory. But when putting it into practice, is it actually achievable? Are organizations explicitly going down a Zero Trust path, and what steps are they taking to implement a Zero Trust architecture?

Okta dug in and surveyed security leaders about their current Zero Trust projects. This infographic shows where organizations are in their Zero Trust journey, what technologies your peers are implementing, and their plans for their future.

The Benefits of a Virtual Roundtable

90 Minutes of Networking

90 minutes is the perfect amount of time to build relationships, form trust and spark future conversations. It allows you to learn about like-minded professionals and their role within their organisations.

Unlock Business Solutions

Learn how like-minded professionals have reacted to similar business challenges. Obtain advice from a powerful solution-provider on the challenges you currently face.

Stimulate Fresh Ideas

Our network can be a source of new perspectives and ideas to help your role. Also, you could build your reputation by positioning yourself as a thought-leader and offering your thoughts and ideas.
Okta Virtual Roundtable - 30th September 2020 2

About Okta

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Nearly 8,000 organizations, including Engie, JetBlue, Nordstrom, Takeda Pharmaceutical, Teach for America, T-Mobile and Twilio, trust Okta to help protect the identities of their workforces and customers.

Okta Virtual Roundtable - 30th September 2020 3

What is a Virtual Roundtable?

A Virtual Roundtable is a thought-leading discussion between senior corporate leaders using video conferencing technology. Offering a digital alternative to physical business events and roundtable dinners, Virtual Roundtables help professionals to identify actionable solutions to their key challenges without the need to leave their home or office.

get in touch

Enquire today for more information