Identity's role in zero trust

Zero trust starts with a change in philosophy

Title of the webinar on a blue background with an 'O' pattern
whitepaper

WATCH FREE

Cloud and mobile have dissolved the network perimeter, and remote workers have also escaped the perimeter - so how do you keep your applications secure? 

Moving from a perimeter-centric to a zero trust model is key to staying secure in our modern world of work. 

In this on-demand presentation, Sami Laine, principal security architect at Okta, discusses: 

  • Frameworks for a zero trust model
  • What contextual access is and how it works
  • The zero trust IAM maturity curve
  • Three fundamental zero trust properties

Provided by 

Okta logo

.

Recommended

Russia's "politically motivated" REvil raid could be used as leverage, experts warn
ransomware

Russia's "politically motivated" REvil raid could be used as leverage, experts warn

17 Jan 2022
Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp
phishing

Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp

21 Dec 2021
Five things to consider before choosing an MFA solution
Security

Five things to consider before choosing an MFA solution

17 Dec 2021
Australia and US sign CLOUD Act data-sharing deal to support criminal investigations
cyber crime

Australia and US sign CLOUD Act data-sharing deal to support criminal investigations

16 Dec 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
Synology DiskStation DS2422+ review: A cube of great capacity
network attached storage (NAS)

Synology DiskStation DS2422+ review: A cube of great capacity

10 Jan 2022