Strengthen enterprise defense with a shift to strong identity management
Attackers are evolving their techniques to target people rather than infrastructure, and enterprises need to shift from traditional perimeter defense to identity-driven security. The Okta Identity Cloud and Proofpoint’s Targeted Attack Protection (TAP) make this possible, working together to combine best-of-breed identity management with world-class email security to help secure Office 365, G Suite, all Okta-federated apps, and your entire IT environment. The joint solution provides a powerful defense against phishing and credential-based attacks, giving enterprise teams unprecedented visibility across today’s threat landscape, granular adaptive controls for proactive security, and powerful tools to automate threat remediation.
Protect all users, even those most targeted, with adaptive security policies
Enterprises need to protect all users, but not all users are considered equal by attackers. Some people within your organization are more likely than others to be targets of attack, such as executives, admins, and developers, because they have access to sensitive information and/or high levels of access. And sometimes your most attacked people are not who you expect. It’s important to understand who are your most at-risk users, or Very Attacked Persons (VAPs), and be able to proactively protect them. Proofpoint provides visibility into attacks, including attack types and targets, and identifies your organization’s VAPs, which is a dynamic list based on how attacks and targets evolve over time. Through an API integration, Proofpoint sends VAP information to Okta, enabling organizations to apply adaptive controls across users, devices, and applications. The Okta Identity Cloud can enforce stronger security policies, like restricting application access or applying stricter password requirements, against your most at-risk users. This enables you to provide proactive, granular protection when and where it’s needed most.
Recognize and Stop Cloud Account Takeover Attempts
Proofpoint detects and remediates suspicious logins to cloud applications via TAP, Cloud App Security Broker (CASB) behavior analytics and Proofpoint and third‑party threat intelligence. Based on customer policy, CASB instructs Okta on the appropriate remediation action.
Quickly remediate attacks with automated security responses
Hackers are increasingly targeting employees to gain access to enterprise assets, and security teams are scrambling to manage disparate tools to sift through a never-ending stream of security alerts. Strong email security and identity-centric remediation tools can help enterprises confidently automate incident response to reduce response time and help turn the tide against credential phishing attacks. When a user clicks on a malicious link in an email, Okta and Proofpoint work together to enable decisive automated actions that contain the threat and limit the damage. The integration automates remediation actions, like quarantining malicious emails through Proofpoint’s Threat Response Auto-Pull (TRAP) and enforcing step-up authentication on potentially compromised users through the Okta Identity Cloud.
Strengthen enterprise security with unprecedented threat visibility and remediation tools
- Protect the enterprise with comprehensive email and identity security for people-centric security
- Take an adaptive, risk-based approach to mitigate credential-phishing threats
- Enable identity-driven, automated remediation actions against attacks as they happen
1 Verizon 2019 Data Breach Investigations Report