Story image

Exabeam and Okta partner to add context to identity management

23 Aug 18

Security information and event management company Exabeam and identity solutions provider Okta have partnered to deliver an identity security solution that enables organisations to detect, investigate and respond to credential-based attacks in real time.

By joining the Okta Integration Network, Exabeam benefits from Okta’s identity platform, helping security teams to proactively detect and respond to user-based threats before they become critical.

According to the 2018 Verizon Data Breach Investigations Report, stolen credentials continue to top the list of causes for data breaches.

Many organisations still focus on securing their network perimeter instead of how they secure their extended enterprises.

By adopting a zero trust security model, organisations can better position themselves to respond to credential-based attacks by shifting their focus from protecting legacy single, large perimeters to protecting every user and device within the organisation.

The joint Exabeam and Okta solution will help security teams to monitor and protect enterprises against credential-based threats.

Exabeam Security Intelligence Platform (SIP) ingests user authentication events and rich identity context via API integration.

Exabeam then analyzes that information and adds meaningful context to enable the detection of suspicious login activities.

Security teams can then take immediate action via fully or partially automated playbooks that require suspicious users to verify their identity via step-up authentication, or that enforce containment actions, such as disabling the user’s account, reducing the user’s access or denying authentication attempts.

“Whether it’s a malicious or compromised insider, credential-based threats are tricky to identify,” says Exabeam worldwide channels vice president Ted Plumis.

“We are excited to partner with Okta to deliver a security solution that will provide customers with visibility and additional context—empowering analysts to identify and remediate compromised user accounts in real time.”

“In today’s threat environment, security is at the forefront of every organisation’s mind, no matter what industry they are in, and the more intelligence that is available to them, the better decisions they can make to keep their users and data safe,” says Okta integrations and strategic partnerships vice president Chuck Fontana.

“We’re excited to be working hand-in-hand with Exabeam to unite Okta's identity insights and user remediation with Exabeam's user and entity behaviour analytics capabilities to help close the security loop against sophisticated threats.”

The joint solution provides a complete view of security events across an organisation, contextualised with user identity information, in a unified security management system that detects suspicious from normal behaviour, surfaces real alerts instantly with clarifying contextual data, and initiates automated remediation measures where appropriate.

Combatting the rise of Cybercrime-as-a-Service
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more. 
Dell EMC advances hybrid cloud for VMware environments
Through collaboration and joint engineering, Dell EMC and VMware are enabling organisations to derive more value from IT investments.
ThreatQuotient partners with Visa for payments safety
“Cyber criminals are reusing tactics, techniques and procedures, leaving a recognisable trail of breadcrumbs and insights into the very attacks they are launching.”
Gartner names Bitglass a leader in cloud security
Bitglass was evaluated based on its ability to execute and its completeness of vision.
Universities seeing rise in DDoS attacks
Overall, between July and September, DDoS botnets attacked targets in 82 countries.
Security cameras – a latent botnet network?
In a comparison of 16 indoor and outdoor IP surveillance cameras, researchers found only one well-protected device.
2018’s worst malware revealed in report
Webroot has highlighted the top cyberattacks of 2018 in its latest Nastiest Malware list, which showcases the malware and attack payloads that have been most detrimental to organisations.
How phishing is evolving to outpace awareness
While email providers have made strides in flagging suspicious emails and source domains, reducing the effectiveness of attacks, attackers’ techniques have also evolved.