Zero Trust in Practice: Identity Drives an Adaptive Workforce Dalton Culp
The traditional network perimeter has dissolved RESOURCES Infrastructure IaaS On-Prem Servers Applications Cloud apps On-Prem Apps APIs Public Private Employees Contractors Partners Customers Services PEOPLE Result: We can no longer assume trust
People are the new perimeter IDENTITY defines the experience Continuous authentication to services in real-time Shift access controls to the application layer IDENTITY lays the groundwork Make decisions based on dynamic context IDENTITY drives security
When People are the Perimeter, Identity Becomes the Foundation of a Zero Trust Strategy
LDAP, RADIUS, SAML, WS-Federation, OAuth, OpenID Connect, RDP, SSH RESOURCES Infrastructure IaaS On Prem Servers Applications Cloud apps On Prem Apps APIs Public Private LDAP, RADIUS, SAML, WS-Federation, OAuth, OpenID Connect, RDP, SSH IDENTITY & ACCESS Authentication Authorization Inspection Network context Device context Location context PEOPLE Employees Contractors Partners Customers Services
Contextual Access Management Resource Network Context New IP Specified IP Zones Network anonymizers Device Context New device Managed device Location Context New city/state/country New geo-location Impossible travel Contextual Response Prompt for 2nd factor Allow/deny access Raise alert Identity
The Big Outcome right people right level of access right resources have the right level of access to the right resources in the right context that is assessed continuousl y Least Friction Possible
Identifying the Pain Points Multiple user stores with no “source of truth” Password sprawl across company resources Disparate access management products No way to enforce least privilege access Manual PKI & Key Management No inventory of employee devices No way to grant contractors temp access Lack of visibility into user behavior
Zero Trust Maturity Curve Stage 4: Adaptive Workforce PROTECTION Stage 3: Contextual Access Stage 2: Unified IAM Stage 1: Fragmented Identity Risk-based access policies Continuous and adaptive authentication and authorization Frictionless access Context-based access policies Multiple factors deployed across user groups Automated deprovisioning for leavers Secure access to APIs Single sign-on across employees, contractors, partners Modern multi-factor authentication Unified policies across apps and servers Active Directory on- premises No cloud integration Passwords everywhere ADOPTION
There’s no silver bullet for Zero Trust The Zero Trust journey starts with Identity Okta is the modern Zero Trust Platform
The Zero Trust journey starts with Identity There’s no silver bullet for Zero Trust Okta is the modern Zero Trust Platform “Okta was the foundation that could help us mature to a zero trust model.” -Melody Hildebrandt, Global CISO, 21st Century Fox
Okta’s legacy of leadership across analyst research Two for two – Leader in top industry research Gartner Access Management MQ and Forrester IDaaS Wave Perfect record – Tenth consecutive Leader placement in identity research from Gartner and Forrester Leading in execution – Top ranked vendor in both Product and Vision across key analyst research Forrester Wave Identity-As-A-Service for Enterprise, June 2019 Gartner Magic Quadrant Access Management, August 2019 Gartner, Inc., Magic Quadrant for Access Management, Michael Kelley, Henrique Teixeira, Abhyuday Data, 12 August 2019 The Forrester Wave™: Identity-As-A-Service for Enterprise, Q2 2019, Forrester Research, Inc., 12 June 2019
The Global 2000 Depend on Okta © Okta and/or its affiliates. All rights reserved.