Proofpoint and Okta Protect Users Most Targeted by Cyberattacks



Organizations continue to struggle with advanced attacks that are focused on targeting their individual users. Proofpoint takes a people-centric approach to looking at how threat actors carry out their attacks. This allows us to provide you with visibility into the most attacked users within your organization. Based on various attack criteria—such as attack targeting, type of attack, and threat actor sophistication—we can generate the threat severity for each attack. We look at the overall volume of attacks impacting an individual user. And combining these provides you with visibility into the Very Attacked People (VAPs) within your organization. Providing this level of visibility is just one piece of the puzzle when it comes to helping your organization solve for these threats. Adaptive controls are an important part of mitigating damage that can come from these threats. While we have several adaptive controls built into our solutions, we also have a partnership with Okta. With Okta, you get a cloud-based approach to Identity Management, with simplicity of setup and ease of use for end users. Together, we can understand your organization’s most risky users with Proofpoint tools, and we can manage the user’s identity with Okta Identity Cloud. This provides you with the enhanced security you need when your organization—and your people—come under attack from sophisticated threats. This integration provides you with several impactful use cases to protect your organization and your most attacked people. As a joint customer, you can: • Assign access to applications or restrict access to risky applications based on the riskiness of your users. • Create dynamic MFA policies based on user risk. This includes MFA session and factor length, which MFA factors users are required/allowed/disallowed from enrolling, and app-level MFA requirements. • Adjust a user’s roles or entitlements for authorization in downstream apps if they are deemed high risk. • Automatically adjust password policy such as complexity, history, expiration and reuse for your most highly attacked users. Learn more: https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-expands-okta-partnership-protect-users-most-targeted-cyberattacks Follow Proofpoint on LinkedIn: https://www.linkedin.com/company/proofpoint Connect with Proofpoint on Facebook: https://www.facebook.com/proofpoint Follow Proofpoint on Twitter: https://twitter.com/proofpoint


Comments