Identity's role in zero trust
Zero trust starts with a change in philosophy


Cloud and mobile have dissolved the network perimeter, and remote workers have also escaped the perimeter - so how do you keep your applications secure?
Moving from a perimeter-centric to a zero trust model is key to staying secure in our modern world of work.
In this on-demand presentation, Sami Laine, principal security architect at Okta, discusses:
- Frameworks for a zero trust model
- What contextual access is and how it works
- The zero trust IAM maturity curve
- Three fundamental zero trust properties
Provided by
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
What is polymorphic malware?
Explainer Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses
-
Outgoing Kaseya CEO teases "this is just the beginning" for the company
Opinion We spoke to Fred Voccola who remains a key figurehead at the firm as it enters its next chapter...
-
HPE eyes enterprise data sovereignty gains with Aruba Networking Central expansion
News HPE has announced a sweeping expansion of its Aruba Networking Central platform, offering users a raft of new features focused on driving security and data sovereignty.
-
Fortify your future: How HPE ProLiant Servers deliver top-tier cyber security, management, and performance
Whitepaper Deploy servers with a secure approach
-
Fortify your future with HPE ProLiant Servers powered by Intel
Whitepaper Enhance your security and manage your servers more effectively
-
Architecting enterprise networks for the next decade
Whitepaper A new paradigm in network architecture
-
Why network monitoring tools fail within secure environments
Whitepaper Gain visibility into devices, networks, and applications
-
Better together: HPE Aruba Networking CX switches and HPE Aruba Networking Central
Whitepaper Explore the power and simplicity of managing HPE Aruba Networking CX Switches with HPE Aruba Networking Central
-
Cyber-resilient infrastructure starts with server security
whitepaper Take a security-focused approach when investing in the next wave of IT infrastructure.
-
Driving digital innovation with intelligent infrastructure
whitepaper Strong infrastructure investment is driving digital in all industries