Identity & Access Management
How to Implement IAM on a Budget in 2025

Economic indicators are pointing to a possible a recession in 2025 and it’s causing the C-suite to re-evaluate spending priorities. Like many IT leaders, you may...

Identity & Access Management
Why cloud-based identities play an important role in cloud security

The new security perimeter of an organization is cloud-based identities. Given its significance, Eric Olden, Strata’s co-founder, and CEO, discusses the role of cloud-based identities in...

Governance & Standards
IDQL & Hexa developer workshop [webinar]

Join select developers and architects in the IDQL working group behind the Hexa project for an interactive, hands-on experience to: Learn how Hexa was built using...

Governance & Standards
How to go from zero to a standard: Building IDQL/Hexa

IDQL is the new identity standard and Hexa is the reference software that makes IDQL operational. Hexa is an active CNCF Sandbox project. Strata recently hosted...

Governance & Standards
What is IDQL? A guide to Hexa Policy Orchestration

What’s especially valuable about IDQL/Hexa is it coordinates consistent policy across cloud platforms and the tech stack. This open-sourced, vendor-neutral approach is needed to expedite adoption...

Identity & Access Management
Strata’s State of Multi-Cloud Identity report reveals 2022’s top IAM challenges for enterprises

With a cloud-first approach gaining momentum, a growing number of applications are being hosted across multiple cloud platforms (AWS, Azure, GCP, etc.). At the same time,...

Identity & Access Management
A guide to IAM terminologies and glossary

✨ Explore our new glossary section, your go-to resource for key terms and definitions in identity security, lightweight IGA, and IAM resilience! Whether you’re new to...

Identity Fabric
How low-code application development & identity management work together

In a recent Helpnetsecurity article, Eric Leach, Chief Product Officer of Strata Identity, discusses why low-code applications and identity management need to co-exist. In the article,...

Identity & Access Management
Managing identity in multi-cloud ecosystems: Key findings from analyst study

The rapid pace of cloud migration has created a chasm between enterprises’ ability to modernize IT infrastructures while maintaining data protection. The increased adoption of multiple...

Governance & Standards
Hexa Policy Orchestration framework: Simplifying IAM policy for multi-cloud ecosystems (by Tom Malta)

In this guest post, IAM expert and global consultant Tom Malta shares his views on how Hexa and IDQL – a new and unique policy orchestration...

App Identity Modernization
A guide to identity and app migration

Why app & identity migrations are necessary and how to make them more manageable Migrating applications and identities to the cloud is a bit like the...

Identity Fabric
Identity fabric: What it is & why it’s needed in multi-cloud environments

Enterprises are rapidly accelerating their adoption of multi-cloud. Although an increasing number of applications are migrated to the cloud every year, the chasm between the ideal...

Identity & Access Management
A guide to Zero Trust cloud security & authentication

It’s a dangerous world. Threats are lurking around every corner bad actors are constantly seeking ways to take advantage of weaknesses. It’s not the trailer for...

Identity & Access Management
The difference between user authentication & authorization

Authorization and authentication are common security terms that sound remarkably similar. It’s easy to confuse the two, and often they’re used interchangeably (though they shouldn’t be)....

App Identity Modernization
What is passwordless authentication (and why does it seem so hard)?

Your company has a cybersecurity problem that it can’t eliminate: your employees. People are the number one security vulnerability in any organization, simply because we’re human...

App Identity Modernization
How to implement MFA for all applications

We use multi-factor authentication (MFA) every day. It’s rote: we log in to apps and enter our username and password. Then, we prove it’s really us,...

Governance & Standards
What the multi-cloud world needs now is consistent identities & policies [ESG Webinar]

A big part of the modern, multi-cloud world means facing threats that target identity vulnerabilities. The hard reality is that most companies have lost sensitive data...

App Identity Modernization
Is your version of SiteMinder reaching its end of service (EOS)? What are your options? 

Change is the only constant in life. Even software that’s decades old goes through inevitable change. For instance, in a customer service announcement, the SiteMinder team...