Okta and Palo Alto Networks team up on security platform

The partnership will automate end-user security on the cloud, on-premise and in hybrid set-ups

Okta and Palo Alto Networks have announced they're teaming up on a security platform to automate end-user security, combining the Okta Identity Cloud and the Palo Alto Networks platform.

The partnership means businesses will be able to quickly identify threats and respond to them before a cyber attack happens, using identity as the basis of their checks, communicating with other parts of a company's infrastructure along the way.

"The security stack must evolve to account for the changing threat landscape, particularly as the proliferation of people, applications and devices only continues to widen and grow," said Frederic Kerrest, Okta COO and co-founder.

Advertisement - Article continues below

"With Okta and Palo Alto Networks technologies working closely together, our joint customers will be able to better manage and secure the vast volume of resources now a part of the extended enterprise, and benefit from monitoring, detecting and alerting to prevent breaches caused by compromised credentials."

Okta and Palo Alto have a long history of working together. For example, the two companies recently announced a partnership that allows Okta admins to automate responses to requests for data stored in the company's identity cloud.

It uses Palo Alto's firewall data and MindMeld information to automate processes including ending a user session, requiring more in-depth authentication or suspending rights to even access Okta's Identitiy Cloud if it feels the user could be a threat actor.

Advertisement
Advertisement - Article continues below

"Credential harvesting is one of the most common tactics for today's threat actors," said Terry Ramos, vice president of business development at Palo Alto Networks.

"Palo Alto Networks delivers the industry's first multi-method, scalable and automated approach designed to prevent credential-based attacks. Together with Okta, we're able to provide a unified view of the user and their networks and take action against potential threats."

Advertisement

Recommended

Visit/security/vulnerability/355236/hp-support-assistant-flaws-leave-windows-devices-open-to-attack
vulnerability

HP Support Assistant flaws leave Windows devices open to attack

6 Apr 2020
Visit/security/cyber-security/355234/safari-bug-let-hackers-access-cameras-on-iphones-and-macs
cyber security

Safari bug let hackers access cameras on iPhones and Macs

6 Apr 2020
Visit/software/video-conferencing/355229/zoom-we-moved-too-fast
video conferencing

Zoom CEO admits company "moved too fast" as privacy issues mount

6 Apr 2020
Visit/security/internet-security/355228/mozilla-fixes-two-firefox-zero-days-being-actively-exploited
internet security

Mozilla fixes two Firefox zero-days being actively exploited

6 Apr 2020

Most Popular

Visit/development/application-programming-interface-api/355192/apple-buys-dark-sky-weather-app-and-leaves
application programming interface (API)

Apple buys Dark Sky weather app and leaves Android users in the cold

1 Apr 2020
Visit/mobile/mobile-phones/355239/microsofts-patent-design-reveals-a-mobile-device-with-a-third-screen
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
Visit/data-insights/data-management/355170/oracle-cloud-courses-are-free-during-coronavirus-lockdown
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020