![](https://storage.googleapis.com/ldo3-files-prod/uploads/asset/cover/4652/thumb_original_Produkt1_Okta_GettingStartedwithZeroTrust_Final.png)
![](https://storage.googleapis.com/ldo3-files-prod/uploads/document/attachment/17969/Vorlage_Mailing-Logo.png)
Client: Okta GmbH
Format: Whitepaper
Size: 264 KB
Language: English
Date: 09.01.2020
Getting Started with Zero Trust
Zero Trust security throws away the idea that we should have a “trusted” internal network and an “untrusted” external network. The adoption of mobile and cloud means that we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for the various users (employees, partners, contractors, etc.) regardless of their location, device or network. There is no silver bullet when it comes to achieving a Zero Trust security architecture, but identity and access management is the core technology that organizations should start with on their Zero Trust journeys.