sb-au logo
Story image

Okta announces security layer for on-prem apps

03 Apr 2019

Identity services provider Okta has today at Oktane19 announced Okta Access Gateway, a new product to enable seamless, secure, single sign-on access, management, and visibility into on-premises applications through the Okta Identity Cloud.

The new product enables organisations with hybrid IT to achieve cloud to ground resource management by bringing all of the Okta Identity Cloud values, including Single Sign-On and Adaptive Multi-factor Authentication to on-premises applications.

Many Okta customers are already using the technology behind Okta Access Gateway today, and Okta expects it to be generally available to everyone later this year.

The explosion of cloud applications has enabled companies large and small to rapidly implement new, best-of-breed technology to help their businesses, and adoption is only increasing.

According to Okta’s Digital Enterprise Report — a survey of 1,050 technology decision makers at organisations with $1 billion in revenue or greater — two-thirds of respondents expect to deploy more cloud apps in the coming year.

However, for many organisations, the present and the future will be hybrid, with mission-critical applications residing both on-premises and across multi-cloud environments.

The Digital Enterprise Report also revealed that a majority of large companies plan to still have at least one-third of their applications running on-premises.

But in a post-perimeter, hybrid world, many enterprises struggle to centrally manage identity and access management (IAM) for both cloud and on-premises environments, resulting in often unwieldy, complex solutions that curb efficiency and security.

Centralising secure access in a hybrid world

Okta Access Gateway solves the hybrid IT access problem for enterprises, connecting on-premises applications from legacy vendors like Oracle, IBM, and SAP, along with custom-built on-premises applications to the Okta Identity Cloud.

Using a flexible deployment model that gives enterprises the choice between deploying a proxy on-premises or through multiple IaaS vendors including Amazon Web Services, Google Cloud Platform, and Microsoft Azure, Okta Access Gateway delivers a simple solution to modern, hybrid identity and access management.

Through the Okta Identity Cloud, enterprises can manage and secure access to their applications from a single, independent source without any vendor constraints or lock-in, leveraging Okta technology relied on by 6,100 Okta customers.

“Okta believes in enabling every organisation to connect to the technology it needs, regardless of where that technology sits,” says Okta chief executive officer and co-founder Todd McKinnon.

“With the Okta Access Gateway, we’re able to take a major step forward in providing enterprises a more seamless experience managing their hybrid IT, providing secure access and visibility — all through the Okta Identity Cloud.”

“Hitachi has a rich history of innovation, and we constantly strive to provide the best technology to our employees,” says Hitachi Americas and EMEA Chief Information Officer Ashish Sanghrajka.

“That means integrating cloud technologies with our already-existent application infrastructure, which presented immense complexity across our global business units.

“Okta Access Gateway was the right technology for us to transform our legacy authentication infrastructure without disrupting the legacy systems.”

Story image
2021's Most Wanted: Emotet continues reign as top malware threat 
The Emotet trojan continues to reign as top malware in January, despite international law enforcement taking control of its infrastructure.More
Story image
Ping Identity announces appointment of new VP of R&D
In his new role as head of research and development, Burke will be expected to drive product strategy and development across Ping Identity’s entire suite of solutions.More
Story image
Cybersecurity risk has never been greater," declares FortiGuard Labs
Adversaries are highly adaptable as they conduct sophisticated attacks, particularly against remote workers, digital supply chains, and core networks.More
Story image
Creating a strong culture of security within organisations
CISOs worldwide are inherently aware of how significant investment in cybersecurity strategies and technologies can bolster an organisation’s protection against cyberattacks. However, many overlook the importance of culture when it comes to cybersecurity.More
Story image
Kaspersky ranked number one in channel partner satisfaction
“Being recognised for the second consecutive year as the number one cybersecurity vendor for channel satisfaction, reflects the investment we have made in the Kaspersky United partner program over the past two years."More
Story image
Essential tools for managing user identity and how they impact your bottom line
Customer identity and access management (CIAM) is how companies give their end-users access to their digital properties, as well as how they govern, collect, analyse, and securely store data for those users.More