Okta Identity Threat Protection (ITDR)
<Presenter Name>
<Presenter Job Title>, Okta
<Presenter2 Name>
<Presenter2 Job Title>, Okta
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© 2023 Okta and/or its affiliates. All rights reserved.
{Presenter Name}
{Presenter title}
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© 2023 Okta and/or its affiliates. All rights reserved.
Partner logo
This presentation contains “forward-looking statements” within the meaning of the “safe harbor” provisions of the Private Securities Litigation Reform Act of 1995, including but not limited to, statements regarding our financial outlook, product development, business strategy and plans and market trends, opportunities and positioning. These forward-looking statements are based on current expectations, estimates, forecasts and projections. Words such as “expect,” “anticipate,” “should,” “believe,” “hope,” “target,” “project,” “goals,” “estimate,” “potential,” “predict,” “may,” “will,” “might,” “could,” “intend,” “shall” and variations of these terms and similar expressions are intended to identify these forward-looking statements, although not all forward-looking statements contain these identifying words. Forward-looking statements are subject to a number of risks and uncertainties, many of which involve factors or circumstances that are beyond our control. For example, the market for our products may develop more slowly than expected or than it has in the past; our operating results may fluctuate more than expected; there may be significant fluctuations in our results of operations and cash flows related to our revenue recognition or otherwise; a network or data security incident that allows unauthorized access to our network or data or our customers’ data could damage our reputation;
Safe harbor
we could experience interruptions or performance problems associated with our technology, including a service outage; we may not be able to pay off our convertible senior notes when due; and global economic conditions could deteriorate. Further information on potential factors that could affect our financial results is included in our most recent Annual Report on Form 10-K and our other filings with the Securities and Exchange Commission. The forward-looking statements included in this presentation represent our views only as of the date of this presentation and we assume no obligation and do not intend to update these forward-looking statements.
Any unreleased products, features or functionality referenced in this presentation are not currently available and may not be delivered on time or at all. Product roadmaps do not represent a commitment, obligation or promise to deliver any product, feature or functionality, and you should not rely on them to make your purchase decisions.
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved.
Identity is the connective fabric between the complex ecosystem of people and technologies, securely enabling your workforce to do their best work
The role of Identity in Security
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
Zero Trust & Risk Strategy
Any resource.
Any device.
Anywhere.
One secure passwordless experience.
Leading the journey to Phishing Resistance
Enhanced User & Admin Experience
Strengthen� Device Security
Evaluate Risk Continuously
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
Risk is informed through indicators of compromise
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© 2023 Okta and/or its affiliates. All rights reserved.
We have no shortage of risk signals, but need the ability to quickly consolidate and take action on those insights
Security Stack
Service Providers
Risk
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved.
Assess ��
Amplify ��
Adapt ��
The new security paradigm centralizes understanding of risk
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
The Okta Risk Ecosystem
ThreatInsight
Class-leading protections offered by default, to protect users from suspicious login attempts
Foundational Security
Behaviors
Customizable profile controls to detect anomalous patterns & user behavior detections.
Customizable controls
Risk-based Auth.
Enabling intelligent prompting of MFA when the possibility of a threat actor exists.
AI-based Adaptive Auth
Identity Threat Protection (ITP)
Continuous identity threat assessment using first party and third party signals.
AI-based ITDR solution
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© 2023 Okta and/or its affiliates. All rights reserved.
App A
App B
App C
Device 1
Device 2
Identity
ThreatInsight�(pre-auth.)
The Okta Risk Paradigm: ThreatInsight
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© 2023 Okta and/or its affiliates. All rights reserved.
App session 1
App A
App B
App C
Device 1
Device 2
Identity
Okta session
passage of time
persistence of access
App session 3
Okta session
Login Risk
ThreatInsight�(pre-auth.)
The Okta Risk Paradigm: Risk-based auth
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© 2023 Okta and/or its affiliates. All rights reserved.
App session 1
App A
App B
App C
Device 1
Device 2
Identity
Okta session
Session Risk (ITP)
App session 2
App session 3
passage of time
persistence of access
App session 3
Okta session
Login Risk
ThreatInsight�(pre-auth.)
The Okta Risk Paradigm: Identity Threat Protection
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© 2023 Okta and/or its affiliates. All rights reserved.
App session 1
App A
App B
App C
Device 1
Device 2
Identity
Okta session
Entity User Risk (ITP)
Session Risk (ITP)
App session 2
App session 3
passage of time
persistence of access
App session 3
Okta session
Login Risk
ThreatInsight�(pre-auth.)
The Okta Risk Paradigm: Identity Threat Protection
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© 2023 Okta and/or its affiliates. All rights reserved.
Risk Engine
Policy
Continuous Risk Assessment
1st Party Signals
UEM
XDR
MDM
SOAR
ZTNA
CASB
SaaS
NGFW
3rd Party Signals
1st Party Signals
Device context�(Continuous)
SaaS apps built on CIC
Admin / user reported risk change
Authentication /�IP enrichment
Universal App Logout
Inline
30+ 3rd party integrations
50+ supported actions
SSE Transmitter / �Downstream Apps
Real Time Actions
MFA
Session
Session Risk�Assesses login/session based on IP, (1/3P) device context change
Entity (User) Risk �Detections for suspicious activity, MFA fatigue, critical state changes & 3P signals
Auth Policy��Evaluates IP, risk, behavior, and device context
Entity Policy
Allows admins to define responses to risk detected outside of authN context
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
What is it?
Standards-based means of receiving and transmitting security and risk events.
Benefits
Allows customers to simply incorporate 3rd party signals at scale into Okta’s Risk Engine
Expands Okta’s visibility into events relevant to user risk by orders of magnitude.
Shared Signals Framework (SSF) Pipeline
SSF
Device Events
Risk Events
Network Events
Application Events
User Events
Risk Events
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
Continuous Access Evaluation (CAE) Policy
What is it?
Continuously evaluates admin configured policies based on changes in the IP address, risk posture, or device posture of a user
Automatically publishes events to the syslog if policy requirements are not met
Benefit
Assess user risk on a continuous basis
Support remediation activities, such as session termination
Gain a more holistic view of user risk across your security ecosystem
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
What is it?
Revoke all active sessions on all devices for all supported applications at once, at anytime
Support ~15 top-tier applications with more to follow
Benefits
Prevent terminated employees and partners from accessing company resources via active sessions
Force an end user to re-authenticate in case of a security or risky event
Universal App Logout
App Sessions
Actions powered by
IDP Session
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
Identity Threat Protection with Okta AI
Universal App Logout
SaaS apps built on CIC
Partner signals
Actions powered by
57 Supported Actions
3P integrations
Identity Risk Engine & Continuous Evaluation
Real Time
Device �Context
End User Reported risk change
Threat �Insights
Real Time
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved.
[Partner Placeholder Slide]
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved.
[Partner Placeholder Slide]
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved.
[Partner Placeholder CTA Slide]
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved.
Thank You
Partner logo
© Okta and/or its affiliates. All rights reserved. Confidential Information of Okta – For Recipient’s Internal Use Only.
© Okta and/or its affiliates. All rights reserved.