Palo Alto Networks and Okta join forces to protect enterprises from the data center to the cloud
Collaboration enables the enforcement of a multi-factor authentication policy to stop cyber adversaries from accessing sensitive resources.
Identity for the enterprise provider Okta (Nasdaq: OKTA) has integrated its cloud services with Palo Alto Networks’ (NYSE: PANW) Next-Generation Security Platform in a bid to improve security metrics across cloud, on-premises and hybrid applications and data centres.
The company’s cloud, Okta Identity Cloud, in conjunction with the Palo Alto Networks platform, allows organisations to incorporate identity and automatically respond to threat actors to prevent cyber-attacks.
The collaboration between the two companies has also been designed to carry out deeper integrations with other layers of a given organisation’s security stack, with Okta acting at the identity level and Palo Alto Networks at the network, cloud and endpoint.
The integrated platform enables the enforcement of a multi-factor authentication policy to stop cyber adversaries from using stolen credentials, moving laterally in a network or accessing sensitive resources.
Frederic Kerrest, Okta COO and co-founder, said: “The security stack must evolve to account for the changing threat landscape, particularly as the proliferation of people, applications and devices only continues to widen and grow.
“With Okta and Palo Alto Networks technologies working closely together, our joint customers will be able to better manage and secure the vast volume of resources now a part of the extended enterprise, and benefit from monitoring, detecting and alerting to prevent breaches caused by compromised credentials.”
Terry Ramos, vice president of business development at Palo Alto Networks, said: “Credential harvesting is one of the most common tactics for today’s threat actors.
“Palo Alto Networks delivers the industry’s first multi-method, scalable and automated approach designed to prevent credential-based attacks. Together with Okta, we are able to provide a unified view of the user and their networks and take action against potential threats.”