Gain Adaptive Controls for High-Risk Users and Credential Phish Protection

Organizations continue to struggle with advanced attacks that are focused on targeting their individual users. At Proofpoint, they take a people-centric approach to looking at how threat actors carry out their attacks. This allows them to provide you with visibility into the most attacked users within your organization. Based on various attack criteria—such as attack targeting, type of attack, and threat actor sophistication—they can generate the threat severity for each attack. Going further, they look at the overall volume of attacks impacting an individual user. And combining these provides you with visibility into the Very Attacked People (VAPs) within your organization.

Providing this level of visibility is just one piece of the puzzle when it comes to helping your organization solve for these threats. Adaptive controls are an important part of mitigating damage that can come from these threats. While Proofpoint have several adaptive controls built into their solutions, they also have a partnership with Okta. This lets them extend these adaptive controls to Identity Management. With Okta, you get a cloud-based approach to Identity Management, with simplicity of setup and ease of use for end users. And together, you can understand your organization’s most risky users with Proofpoint tools and manage the user’s identity with Okta Identity Cloud. This provides you with the enhanced security you need when your organization—and your people—come under attack from sophisticated threats.

This integration provides you with several impactful use cases to protect your organization and your most attacked people. As a joint customer, you can:

  • Assign access to applications or restrict access to risky applications based on the riskiness of your users.
  • Create dynamic MFA policies based on user risk. This includes MFA session and factor length, which MFA factors users are required/allowed/disallowed from enrolling, and app-level MFA requirements.
  • Adjust a user’s roles or entitlements for authorization in downstream apps if they are deemed high risk.
  • Automatically adjust password policy such as complexity, history, expiration and reuse for your most highly attacked users.

Download the Solution Brief on Proofpoint and Okta’s partnership here or contact your local Exclusive Networks Account Manager to learn more.