REGISTER

Information Security

oktatn default Download

This document provides an introduction to Okta’s approach to managing security throughout the following chapters:

oktatn default Download

As identity related attacks have increased in recent years, organizations are continuously evaluating how to optimize the security policies in their environment.

oktatn default Download

Enabling large workforces to securely work from home requires a very specific set of tools. Here’s how to safely empower your teams.

oktatn pdf Download (1.43 MB)   

Organizations across the globe have felt and experienced the impact of 2020. Some have been able to navigate the changes better than others.

oktatnWatch now

Zero Trust - the idea that all access to corporate resources should be restricted until the user has proven their identity and access permissions, and the device has passed a security profile check, a core concept for Okta.

oktatn pdf Download (17.27 MB)   

Your modern attack surface has never been more complex. Today, you have more assets, more asset types, a diverse attack surface and
an increasing number of vulnerabilities.

qualystn pdf Download (892 KB)

Frost & Sullivan believes that Authentic8, with its cloud browser service, Silo, properly epitomizes an overlay plus solution. As described in this New Product Innovation Award recognition, Silo was designed for organizations that have web access use cases their legacy access and content control technologies do not address - or address with excessive friction (operations and end-user impact).

oktatn pdf Download (250 KB)   

In contrast, taking a risk based approach to vulnerability management enables security teams to focus on the vulnerabilites which are more important.
.

oktatn default Download

The COVID-19 pandemic has created unprecedented challenges for organizations around the world. With millions of people suddenly working from home for the first time, companies need ways to ensure productivity, connectivity, and security—quickly

Authentic8TN pdf Download (469 KB)

The Productive Browser Project is a continuation of the previously completed Virtual Browser Project. The primary goal of the Productive Browser Project is to determine whether a virtual browser can provide sufficient security with minimal impact on the productivity of a typical enterprise end user. This project focuses on validating the security properties hypothesized as a result of isolating the web browser through virtualization technology. The security tests feature many of the typical attacks encountered by enterprise users and compare the security of a Virtual Browser to Google Chrome.

oktatn pdf Download (448 KB)   

An Analysis of the Market for Information Archiving Solutions Revealing Top Players, Trail Blazers, Specialists and Mature Players, from The Radicati Group, Inc

oktatn pdf Download (1.15 MB)   

Microsoft 365 (the new package of offerings formerly known as Office 365) is Microsoft’s cloud service offering for individual productivity, team collaboration, and enterprise communication, complemented by a set of security and compliance capabilities.

CentrifyTN pdf Download (321 KB)

Centrify delivers Zero Trust Security through the power of Next-Gen Access. Centrify verifies every user, validates their devices, and limits access and privilege.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top