The African digital landscape is evolving at a critical pace, and staying secure requires a foundation of world-class collaboration and technical rigor.
We are proud to announce that Libertad has officially joined the Okta Partner Program.
We are honored to join this selective program and are committed to helping drive a higher standard of security and resilience throughout the African region.
This partnership comes at a time when the ecosystem is being reshaped by “AI sprawl” and the rapid rise of autonomous AI agents and automated service accounts that often operate outside traditional security visibility.
Without a robust identity framework, these sprawling agents represent a massive, unmanaged attack surface. By combining Okta’s leading identity platform with the Libertad Operational Technical Force, we are helping African organisations ensure that every human and non-human identity is verified, governed, and secured.
There is no silver bullet solution when deciding on a Zero Trust Architecture. You can’t get there overnight, nor is it in fact ever actually ‘complete’, but you can get there. It’s a strategy, a posture, and a set of products and technologies. Adopting a zero trust security strategy provides the ability for organisations to transform and innovate, adopt new technologies and practices, optimise productivity and reduce their risk surface. Zero Trust is not a novel concept or idea.
The industry has been discussing the reality of the shifting perimeter for nearly two decades. Only within the last 5-10 years have we finally reached a point where organisations are (1) prioritising security strategy and, (2) technology has
undergone enough innovation to support implementing these new strategies. What has become very clear is that identity and access management (IAM) solutions offer the core technology that organizations should start with on their zero trust journeys.
The security landscape is constantly shifting, and some seismic shifts happened in the last decade that really highlighted the need for a more modern strategy focused on identity and not just the network. Zero trust was brought into sharp focus in 2020 when the worldwide pandemic forced many organisations to support remote work overnight, effectively dismantling traditional security models, accelerating the adoption of cloud technologies, and forcing the shift to support work outside the safety of a corporate network.
As the world emerged from the pandemic, many organisations decided to continue supporting a dynamic work model, meaning they must maintain flexibility while securing fully distributed workforces and hybrid working models. The modern workforce, comprised of employees, contractors, partners, and suppliers are all accessing more resources and data (stored in the cloud and on-premises), from more devices and locations than ever before.
As the infrastructure has evolved, the risk surface has expanded with an increasing number of access points and these are being exploited at an alarming rate. Reported cyberattacks have increased exponentially. While attack methods have become more sophisticated, they still primarily target identity. Credential abuse and highly targeted phishing attacks remain the leading cause of breaches today.
Gaps in identity protection introduce countless risks like account takeover, supply-chain, and ransomware attacks. In 2025, organisations can no longer automatically assume trust across any part of the IT stack.
Regardless of industry or geography, secure trusted users are more important than ever, and identity is the modern perimeter. Analysts and practitioners have collectively evolved the understanding of a zero trust security strategic approach to match advances in technology and the way we work.
In all cases, the approach has become increasingly more risk-based and identity-centric. This is where Okta can support organisations. Okta is able to help address the business challenges being faced and accelerate adoption of a zero trust security approach by providing the foundation for secure identity and context-aware access protecting the modern perimeter.



