Okta and Palo Alto Networks team up on security platform

The partnership will automate end-user security on the cloud, on-premise and in hybrid set-ups

Okta and Palo Alto Networks have announced they're teaming up on a security platform to automate end-user security, combining the Okta Identity Cloud and the Palo Alto Networks platform.

The partnership means businesses will be able to quickly identify threats and respond to them before a cyber attack happens, using identity as the basis of their checks, communicating with other parts of a company's infrastructure along the way.

"The security stack must evolve to account for the changing threat landscape, particularly as the proliferation of people, applications and devices only continues to widen and grow," said Frederic Kerrest, Okta COO and co-founder.

"With Okta and Palo Alto Networks technologies working closely together, our joint customers will be able to better manage and secure the vast volume of resources now a part of the extended enterprise, and benefit from monitoring, detecting and alerting to prevent breaches caused by compromised credentials."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Okta and Palo Alto have a long history of working together. For example, the two companies recently announced a partnership that allows Okta admins to automate responses to requests for data stored in the company's identity cloud.

It uses Palo Alto's firewall data and MindMeld information to automate processes including ending a user session, requiring more in-depth authentication or suspending rights to even access Okta's Identitiy Cloud if it feels the user could be a threat actor.

"Credential harvesting is one of the most common tactics for today's threat actors," said Terry Ramos, vice president of business development at Palo Alto Networks.

"Palo Alto Networks delivers the industry's first multi-method, scalable and automated approach designed to prevent credential-based attacks. Together with Okta, we're able to provide a unified view of the user and their networks and take action against potential threats."

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020