Identity's role in zero trust
Zero trust starts with a change in philosophy
Cloud and mobile have dissolved the network perimeter, and remote workers have also escaped the perimeter - so how do you keep your applications secure?
Moving from a perimeter-centric to a zero trust model is key to staying secure in our modern world of work.
In this on-demand presentation, Sami Laine, principal security architect at Okta, discusses:
- Frameworks for a zero trust model
- What contextual access is and how it works
- The zero trust IAM maturity curve
- Three fundamental zero trust properties