
âWe weren’t looking for three or four tools that would be best of breed to try to make this all work. We wanted one single tool...

âMany apps simply canât be rewritten, making the manual approach impractical from a timing and cost standpoint. â Eric Olden, CEO and Co-founder at Strata Identity...

Adding passwordless authentication is on the short list of identity priorities in 2023 for many organizations. Yet, itâs not as simple as picking a solution and...

Why it’s time to move on from your outdated identity provider The modern digital landscape is expanding and transforming at breakneck speed. As a result, the...

Key insights and highlights from the State of Multi-Cloud Identity Report 2023Â As digital transformation rapidly reshapes the business landscape, multi-cloud strategies are becoming the norm...

The first step in achieving success is recognizing that a merger or acquisition changes processes, webpages, apps, and logins. Although this may seem obvious, what often...

Is it possible to have modern authentication for both standards-based and non-standards-based apps? In todayâs rapidly-evolving business environment, enterprise applications are crucial for driving innovation and...

Imagine you’re a software developer in a large organization. You’ve just spent months, maybe even years, rewriting code for hundreds of applications to meet the latest...

Authorization is at the foundation of modern security and one of the keys to zero trust. On Tuesday, Amazon Web Services (AWS) made Amazon Verified Permissions...

With cloud modernization, one of the most significant challenges for app owners is managing identity and authentication, which can divert attention from creating an exceptional product....

There’s a common thought that if an application speaks industry-leading identity standards, it automatically makes it modern. However, the requirements of apps today go beyond that....

Trailblazing Identity Orchestration for enterprises âMaverics is the only Identity Orchestration platform that allows enterprises to mix and match incompatible identity systems without rewriting each application...

With increased cloud migration and the adoption of cloud-based apps, Cloud Security Architects and IT decision-makers are in a race to achieve interoperability between diverse identity...

Cybersecurity is non-negotiable. So, when it comes to enterprise budgets, itâs the one place we typically donât see cuts â even in an unpredictable economic environment....

The hardest part of identity and access management (IAM) technology is making it work with multi-vendor infrastructure and the growing number of applications that enterprises rely...

Want to loan a friend some money? Thereâs an app for that. Want to exchange some dollars for Euros? Thereâs an app for that. In fact,...

Thereâs a landrush in the identity management space, which has important implications for enterprises that rely on these systems to run their business applications. Private equity...

New round of funding to scale Maverics platform and accelerate go-to-market initiatives âWeâre announcing our Series B financing of more than $26M to support Strata Identityâs...

Weak password security is the most common means for bad actors to get their hands on sensitive information and cause a breach. When work-from-home became the...

3 drivers of the identity modernization imperative: people, processes, technology Identity modernization is the process of moving from managing identities using an on-premises IDP to a...

Identity management & customer journey orchestration In a world of increasingly fickle loyalty, you have to keep your customersâ trust. With the majority of breaches being...

The possibility of a recession is causing the C-suite to re-evaluate spending priorities. Like many IT leaders, you may fear that your Identity and Access Management...

The new security perimeter of an organization is cloud-based identities. Given its significance, Eric Olden, Strataâs co-founder, and CEO, discusses the role of cloud-based identities in...

Join select developers and architects in the IDQL working group behind the Hexa project for an interactive, hands-on experience to: Learn how Hexa was built using...

IDQL is the new identity standard and Hexa is the reference software that makes IDQL operational. Hexa is an active CNCF Sandbox project. Strata recently hosted...

Whatâs especially valuable about IDQL/Hexa is it coordinates consistent policy across cloud platforms and the tech stack. This open-sourced, vendor-neutral approach is needed to expedite adoption...

With a cloud-first approach gaining momentum, a growing number of applications are being hosted across multiple cloud platforms (AWS, Azure, GCP, etc.). At the same time,...

Whether youâre new to identity and access management (IAM) or a seasoned pro, thereâs a lot of technical and complex vocabulary that you have to keep...

In a recent Helpnetsecurity article, Eric Leach, Chief Product Officer of Strata Identity, discusses why low-code applications and identity management need to co-exist. In the article,...

The rapid pace of cloud migration has created a chasm between enterprises’ ability to modernize IT infrastructures while maintaining data protection. The increased adoption of multiple...

In this guest post, IAM expert and global consultant Tom Malta shares his views on how Hexa and IDQL â a new and unique policy orchestration...

Why app & identity migrations are necessary and how to make them more manageable Migrating applications and identities to the cloud is a bit like the...

Enterprises are rapidly accelerating their adoption of multi-cloud. Although an increasing number of applications are migrated to the cloud every year, the chasm between the ideal...

Itâs a dangerous world. Threats are lurking around every corner bad actors are constantly seeking ways to take advantage of weaknesses. Itâs not the trailer for...

Authorization and authentication are common security terms that sound remarkably similar. Itâs easy to confuse the two, and often theyâre used interchangeably (though they shouldnât be)....

Your company has a cybersecurity problem that it canât eliminate: your employees. People are the number one security vulnerability in any organization, simply because weâre human...

Multifactor authentication (MFA) is part of your daily life. You log into applications that ask for your username and password and then require a second confirmation...

A big part of the modern, multi-cloud world means facing threats that target identity vulnerabilities. The hard reality is that most companies have lost sensitive data...

Change is the only constant in life. Even software thatâs decades old goes through inevitable change. For instance, in a customer service announcement, the SiteMinder team...

As systems such as SiteMinder approach their end of service (EOS), enterprises are increasingly tasked with navigating identity and app migrations to the cloud. With multi-cloud...

It’s not a question of if your organization relies on more than one cloud, but how many? Most enterprises today use three or more public clouds....

Multiple clouds mean multiple identity silos. These silos donât talk to each other, creating fragmentation across the clouds. When two or more applications need to work...

The number zero is everywhere these days. Youâve got zero-code, zero-day, Coke Zero, and of course â everyoneâs favorite â zero trust. Whatâs the deal? These...

A recent IT Toolbox article, Top Security Considerations for Transitioning from Private to Public Cloud, emphasized that organizations should re-evaluate how they safeguard their data and...

Strataâs Maverics Identity Orchestration solution was the featured topic while Microsoftâs Stefan van der Wiele interviewed four of Strataâs subject matter experts on an episode of...

MEDIA ADVISORY Jack Poller will Present New Research on Top Identity Management Challenges Facing Organizations in the Cloud and How to Overcome Them BOULDER, Colo., Jan....

More and more organizations are modernizing their legacy identity systems and moving to the cloud. And their migrations arenât deployed to a single cloud, either. A...

One day, combustion engines may become illegal on roads and highways. But what if you have a favorite gasoline-powered car that you love to take out...

The era of multi-cloud is here and here to stay. Strata’s mission is to help enterprises manage the shift from legacy identity systems to the cloud...

Identity and access management (IAM) has been around since the dawn of the computing age. Although the term was once synonymous with the network, IAM and...

SiteMinder is nearing its end of service or end of life (EOL). After 2022, it will no longer be supported, and clients will need to migrate...

The RSA Conference Innovation Sandbox Contest is a big deal. Itâs the Academy Awards for Cybersecurity startups. Of course, like everything else in the COVID era,...

End of Life (EOL) is inevitable for most products. There comes a time when it simply no longer makes sense to keep investing in something. It could be that the product is not generating enough revenue (Sony Playstation Vita), or a miscalculation was made in a diversification strategy (remember New Coke?).

Overview Cloud adoption by healthcare and life sciences organizations accelerated with the events caused by the global pandemic that started in 2019. With remote telehealth and...

The Maverics Identity Orchestration Platform is officially launched! As Michael Vizard of Security Boulevard and IT Security News states, â[Maverics] a platform for orchestrating the management...

âMan cannot discover new oceans unless he has the courage to lose sight of the shore.â – Andre Gilde Iâm thrilled to introduce the Maverics Identity...

Last year set a new high water mark for cloud adoption, especially hybrid cloud environments that combine on-premises and cloud-based apps and identities. According to one...

Over the past few decades, single sign-on (SSO) has become the default security solution for most companies. Itâs convenient for users, so they actually use it....

At Strata, we strive to be a âshow, donât tellâ company. Our customers have our unwavering commitment to do what it takes to: prove that our...

How hybrid IT infrastructures will soon push IAM to the brink. What are identity silos? Identity domains, also known as identity silos, are when user identities...

Modernize any app with any IDP in minutes. Join the ‘Orchestration Kitchen’ workshops. Discover sessions With Strata’s Maverics Identity Orchestratorâ˘, you can migrate and modernize your...

Gartner, Inc. projects 80% of businesses will have all their infrastructure based in the cloud by 2025. The analyst firm also reports that 81% of enterprises...

To take Strata to the next level, we're announcing that weâve raised an $11M Series A, led by outstanding new investor Menlo Ventures. They sincerely believe in our disruptive vision for Identity Orchestration. With this round, Strata deeply extends our bench depth and experience. This funding puts us in the position to help more customers succeed in moving to multi-cloud environments. Strata will use this capital to scale our distributed identity technology and develop the Identity Orchestration market.

This article was originally posted on The New Stack. In his book The Black Swan, Nassim Taleb describes game-changing events that occur randomly and infrequently while...

How financial services can succeed in hybrid and multi-cloud environments â[The financial industry is] facing rapid and significant changesâŚIndustry changes include Open Banking, neo-challenger banks and...

How Strata and Microsoft work together to solve the user provisioning and sync problems across hybrid identity environments Introduction Chances are pretty good that you’re right...