Big Data
Cloud Computing
Data Center
Hardware
HR, Finance, Marketing
Internet
IT Management
IT-Security
Mobile
Network
Software
Client: Okta GmbH
Format: Whitepaper
Size: 264 KB
Language: English
Date: 09.01.2020
Getting Started with Zero Trust
Zero Trust security throws away the idea that we should have a “trusted” internal network and an “untrusted” external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees, partners, contractors, etc.) regardless of their location, device or network. There is no silver bullet when it comes to achieving a Zero Trust security architecture, but identity and access management is the core technology that organizations should start with on their Zero Trust journeys.