iTnews Asia
  • Home
  • News
  • Security

Proofpoint to integrate cloud access security broker with Okta

Proofpoint to integrate cloud access security broker with Okta

To help prevent account takeovers.

By iTnews Asia Team on Jun 20, 2022 10:32AM

Cybersecurity firm Proofpoint said it is integrating its cloud access security broker (CASB) solution with Okta, an identity provider, to help customers detect and remediate suspicious logins for more than 7,000 cloud applications.

The firm said its CASB will now support three major identity providers: Microsoft Active Directory, Okta, and Google.

Maureen Little, vice president of technology partnerships at Okta, said the integration enables customers to protect their end-users from sophisticated "account takeover" attempts.

According to research from Ponemon Institute, companies lose an average of US$6.2 million annually from compromised cloud accounts—or about 3.5 percent of their total revenues.

Survey respondents reported 64 cloud account compromises per year on average, with 30 percent exposing sensitive data.

While the solution automatically adjusts password policy for attacked users, the teams can leverage Okta workflows to act on additional security methods.

It can also remediate suspicious logins based on an organisation's corporate security policies.

"Remediation can include revoking the user session, resetting the MFA factors or suspending the user and forcing a password change," the company said in a product brief.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
© iTnews Asia
Tags:
cybersecurity email google hacking microsoft okta proofpoint security

Related Articles

  • Five tips a CIO or CSO should know to stop employee-driven IP theft
  • StarHub launches app to protect customers from scam calls and SMS
  • Beware the rise of ‘vishing’ as a cyber threat in APAC
  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Five tips a CIO or CSO should know to stop employee-driven IP theft

Five tips a CIO or CSO should know to stop employee-driven IP theft

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

Beware the rise of ‘vishing’ as a cyber threat in APAC

Beware the rise of ‘vishing’ as a cyber threat in APAC

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.