The document discusses how identity and access management solutions from Okta can help organizations accelerate their digital transformations by securely connecting internal and external users to any application or device. It explains Okta's identity solutions which use policy engines and multi-factor authentication methods to securely verify user identities based on the context of device, user, location, network and application in order to mitigate risks and ensure compliance.
What is your mission, and how has it changed over the years?
Every organization is now impacted by technology
Images: https://www.flickr.com/photos/26254305@N08/15751860326
http://www.navy.mil/view_image.asp?id=23565
https://www.flickr.com/photos/departmentofenergy/29386413180/
Our solution to the problem was to build walls and secrets. We viewed information security like building a castle.
Moat to cross in the form of a firewall, with a VPN forming our drawbridge.
Secret passwords to open the gate through our 3-foot-thick stone walls,
and we moved all of our corporate data inside of this fortress
Soon, we were trapped within our network. Sure, things were secure, but all this security was painful for employees.
Mobile devices became a force of change against us
So, as we forced users to have complex passwords, with multiple letters, numbers, symbols, our users put them on post-it notes, and re-used the same password across personal and corporate sites.
When we found passwords were not strong enough, we deployed multifactor tokens, that had to be carried around everywhere we went. Of course, if you left your token on your desk, and the boss wanted that critical report done by the morning, you were stuck.
So users put their multifactor token in front of a webcam!
As technology progressed, and cloud services took off,I struggled to keep our data within the castle walls, implementing filtering at the firewall. But it was a losing battle - employees just used different services.
Now, our castle is in the middle of a city
Customer, partners all collaborators
Employees not graded on security, they have other tasks to do.
Therefore, they are always going to follow the path of least resistance.
Traditional authentication can’t scale with todays applications, usage, and need. When we put identity at the center, we are able to shit to contextual authentication. We gain new information feeds that can be used to build risk-based authentication.
As an admin you can take your organizations authentication experience to the next level. Traditional authentication leverages passwords as the primary authentication factor. The shortfalls of passwords have been well documented. Strong on convience and familiarity, passwords offer protection from a determined attacker. As part of building out our response to eliminate passwords while improving the user experience, admins can leverage our contextual access policies to , if not eliminate passwords to at least make them optional
By centralizing identity, we take away this complexity, speeding adoption of new technologies and gaining the ability to place security where it adds the most value.
When we provide services to our constituents, we have to face the same problems – how to ensure secure access to services without creating a barrier to entry
https://www.flickr.com/photos/aarongustafson/63773435
Handing off identity allows you to focus on your mission.