1 of 22

Okta Identity Threat Protection (ITDR)

<Presenter Name>

<Presenter Job Title>, Okta

<Presenter2 Name>

<Presenter2 Job Title>, Okta

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© 2023 Okta and/or its affiliates. All rights reserved.

2 of 22

{Presenter Name}

{Presenter title}

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© 2023 Okta and/or its affiliates. All rights reserved.

3 of 22

Partner logo

This presentation contains “forward-looking statements” within the meaning of the “safe harbor” provisions of the Private Securities Litigation Reform Act of 1995, including but not limited to, statements regarding our financial outlook, product development, business strategy and plans and market trends, opportunities and positioning. These forward-looking statements are based on current expectations, estimates, forecasts and projections. Words such as “expect,” “anticipate,” “should,” “believe,” “hope,” “target,” “project,” “goals,” “estimate,” “potential,” “predict,” “may,” “will,” “might,” “could,” “intend,” “shall” and variations of these terms and similar expressions are intended to identify these forward-looking statements, although not all forward-looking statements contain these identifying words. Forward-looking statements are subject to a number of risks and uncertainties, many of which involve factors or circumstances that are beyond our control. For example, the market for our products may develop more slowly than expected or than it has in the past; our operating results may fluctuate more than expected; there may be significant fluctuations in our results of operations and cash flows related to our revenue recognition or otherwise; a network or data security incident that allows unauthorized access to our network or data or our customers’ data could damage our reputation;

Safe harbor

we could experience interruptions or performance problems associated with our technology, including a service outage; we may not be able to pay off our convertible senior notes when due; and global economic conditions could deteriorate. Further information on potential factors that could affect our financial results is included in our most recent Annual Report on Form 10-K and our other filings with the Securities and Exchange Commission. The forward-looking statements included in this presentation represent our views only as of the date of this presentation and we assume no obligation and do not intend to update these forward-looking statements.

Any unreleased products, features or functionality referenced in this presentation are not currently available and may not be delivered on time or at all. Product roadmaps do not represent a commitment, obligation or promise to deliver any product, feature or functionality, and you should not rely on them to make your purchase decisions.

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved.

4 of 22

Identity is the connective fabric between the complex ecosystem of people and technologies, securely enabling your workforce to do their best work

The role of Identity in Security

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

5 of 22

Zero Trust & Risk Strategy

Any resource.

Any device.

Anywhere.

One secure passwordless experience.

Leading the journey to Phishing Resistance

Enhanced User & Admin Experience

Strengthen� Device Security

Evaluate Risk Continuously

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

6 of 22

Risk is informed through indicators of compromise

  • Unusual IP location

  • New device
  • Unusual time of day
  • New application access
  • Unusual browser-agent variables
  • and more!

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© 2023 Okta and/or its affiliates. All rights reserved.

7 of 22

We have no shortage of risk signals, but need the ability to quickly consolidate and take action on those insights

Security Stack

Service Providers

Risk

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved.

8 of 22

Assess ��

Amplify ��

Adapt ��

The new security paradigm centralizes understanding of risk

  • Continuously assess Identity risk

    • Evaluate user risk in real-time during initial login to proactively counter vulnerabilities
    • Continuously monitor for signs of session hijacking and other post-authentication risks
  • Harness threat signals across your apps and security stack
    • Uncover and address identity security blind spots through integrated threat signals
    • Enhance security posture and maximize existing investments
  • Respond to threats with precision

    • Take tailored actions inline such as instant logouts or on-demand MFA
    • Execute automated workflows to promptly address emerging risks

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

9 of 22

The Okta Risk Ecosystem

ThreatInsight

Class-leading protections offered by default, to protect users from suspicious login attempts

Foundational Security

Behaviors

Customizable profile controls to detect anomalous patterns & user behavior detections.

Customizable controls

Risk-based Auth.

Enabling intelligent prompting of MFA when the possibility of a threat actor exists.

AI-based Adaptive Auth

Identity Threat Protection (ITP)

Continuous identity threat assessment using first party and third party signals.

AI-based ITDR solution

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© 2023 Okta and/or its affiliates. All rights reserved.

10 of 22

App A

App B

App C

Device 1

Device 2

Identity

ThreatInsight�(pre-auth.)

The Okta Risk Paradigm: ThreatInsight

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© 2023 Okta and/or its affiliates. All rights reserved.

11 of 22

App session 1

App A

App B

App C

Device 1

Device 2

Identity

Okta session

passage of time

persistence of access

App session 3

Okta session

Login Risk

ThreatInsight�(pre-auth.)

The Okta Risk Paradigm: Risk-based auth

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© 2023 Okta and/or its affiliates. All rights reserved.

12 of 22

App session 1

App A

App B

App C

Device 1

Device 2

Identity

Okta session

Session Risk (ITP)

App session 2

App session 3

passage of time

persistence of access

App session 3

Okta session

Login Risk

ThreatInsight�(pre-auth.)

The Okta Risk Paradigm: Identity Threat Protection

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© 2023 Okta and/or its affiliates. All rights reserved.

13 of 22

App session 1

App A

App B

App C

Device 1

Device 2

Identity

Okta session

Entity User Risk (ITP)

Session Risk (ITP)

App session 2

App session 3

passage of time

persistence of access

App session 3

Okta session

Login Risk

ThreatInsight�(pre-auth.)

The Okta Risk Paradigm: Identity Threat Protection

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© 2023 Okta and/or its affiliates. All rights reserved.

14 of 22

Risk Engine

Policy

Continuous Risk Assessment

1st Party Signals

UEM

XDR

MDM

SOAR

ZTNA

CASB

SaaS

NGFW

3rd Party Signals

1st Party Signals

Device context�(Continuous)

SaaS apps built on CIC

Admin / user reported risk change

Authentication /�IP enrichment

Universal App Logout

Inline

30+ 3rd party integrations

50+ supported actions

SSE Transmitter / �Downstream Apps

Real Time Actions

MFA

Session

Session Risk�Assesses login/session based on IP, (1/3P) device context change

Entity (User) Risk �Detections for suspicious activity, MFA fatigue, critical state changes & 3P signals

Auth Policy��Evaluates IP, risk, behavior, and device context

Entity Policy

Allows admins to define responses to risk detected outside of authN context

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

15 of 22

What is it?

Standards-based means of receiving and transmitting security and risk events.

Benefits

Allows customers to simply incorporate 3rd party signals at scale into Okta’s Risk Engine

Expands Okta’s visibility into events relevant to user risk by orders of magnitude.

Shared Signals Framework (SSF) Pipeline

SSF

Device Events

Risk Events

Network Events

Application Events

User Events

Risk Events

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

16 of 22

Continuous Access Evaluation (CAE) Policy

What is it?

Continuously evaluates admin configured policies based on changes in the IP address, risk posture, or device posture of a user

Automatically publishes events to the syslog if policy requirements are not met

Benefit

Assess user risk on a continuous basis

Support remediation activities, such as session termination

Gain a more holistic view of user risk across your security ecosystem

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

17 of 22

What is it?

Revoke all active sessions on all devices for all supported applications at once, at anytime

Support ~15 top-tier applications with more to follow

Benefits

Prevent terminated employees and partners from accessing company resources via active sessions

Force an end user to re-authenticate in case of a security or risky event

Universal App Logout

App Sessions

Actions powered by

IDP Session

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

18 of 22

Identity Threat Protection with Okta AI

Universal App Logout

SaaS apps built on CIC

Partner signals

Actions powered by

57 Supported Actions

3P integrations

Identity Risk Engine & Continuous Evaluation

Real Time

Device �Context

End User Reported risk change

Threat �Insights

Real Time

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved.

19 of 22

[Partner Placeholder Slide]

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved.

20 of 22

[Partner Placeholder Slide]

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved.

21 of 22

[Partner Placeholder CTA Slide]

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved.

22 of 22

Thank You

Partner logo

© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.

© Okta and/or its affiliates. All rights reserved.