The 10 Hottest Zero-Trust Vendors To Watch In 2021
From scrutinizing users and forsaking VPN to embracing micro-segmentation and authentication throughout the network, here’s a look at 10 zero-trust vendors fighting for the dominant position in this booming market.
Okta approaches zero trust security by processing a variety of contextual insights about a user—including their credential, device, location, network, and the application or browser a resource is accessed from. Based on the conditions the customer has defined, Okta’s policy engine will respond with actions such as allow, deny, prompt for multi-factor authentication, and more.
Behavioral detection policies enhance the Okta policy framework by tracking unusual activity such as anomalous location, anomalous IP, and anomalous devices, the company said. Okta’s rogue accounts report compares assignments in Okta to accounts that exist in a specified app and lists the differences, allowing customers to find accounts that were created directly in the app without going through Okta.
Okta plays a critical role to ensure that your users are only able to access applications and resources from devices that you can trust by first recognizing if access is initiated from the correct user, and then assessing that it is a known device. From there, Okta said it needs to assess if the platform and client that the user is attempting to access from follows the customer’s security policy.