Okta and Palo Alto Networks team up on security platform

The partnership will automate end-user security on the cloud, on-premise and in hybrid set-ups

Okta and Palo Alto Networks have announced they're teaming up on a security platform to automate end-user security, combining the Okta Identity Cloud and the Palo Alto Networks platform.

The partnership means businesses will be able to quickly identify threats and respond to them before a cyber attack happens, using identity as the basis of their checks, communicating with other parts of a company's infrastructure along the way.

"The security stack must evolve to account for the changing threat landscape, particularly as the proliferation of people, applications and devices only continues to widen and grow," said Frederic Kerrest, Okta COO and co-founder.

"With Okta and Palo Alto Networks technologies working closely together, our joint customers will be able to better manage and secure the vast volume of resources now a part of the extended enterprise, and benefit from monitoring, detecting and alerting to prevent breaches caused by compromised credentials."

Advertisement
Advertisement - Article continues below

Okta and Palo Alto have a long history of working together. For example, the two companies recently announced a partnership that allows Okta admins to automate responses to requests for data stored in the company's identity cloud.

It uses Palo Alto's firewall data and MindMeld information to automate processes including ending a user session, requiring more in-depth authentication or suspending rights to even access Okta's Identitiy Cloud if it feels the user could be a threat actor.

"Credential harvesting is one of the most common tactics for today's threat actors," said Terry Ramos, vice president of business development at Palo Alto Networks.

"Palo Alto Networks delivers the industry's first multi-method, scalable and automated approach designed to prevent credential-based attacks. Together with Okta, we're able to provide a unified view of the user and their networks and take action against potential threats."

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/mobile/mobile-phones/354273/pablo-escobars-brother-launches-budget-foldable-phone
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019