sb-eu logo
Story image

Okta enhances its Adaptive Multi-Factor Authentication

Global Identity and Access Mangement (IAM) provider Okta has announced new functionality for its cloud-based Okta Adaptive Multi-Factor Authentication (AMFA).

The announcement came at the company’s annual Oktane conference in Las Vegas, which saw record attendance figures of over 2500 people.

Okta AMFA will now provide a more comprehensive set of authentication factors and robust policy frameworks that support contextual access management and adaptive, risk-based authentication.

AMFA will also support a broader set of applications, and can now be used for RDP, LDAP, other Single Sign On (SSO) products, ADFS, custom web apps and RADIUS.

It’s an effort to bolster the effectiveness and reach of the Okta Identity Cloud and more specifically the Okta application network, which the company has renamed, now calling it the Okta Integration Network.

Yassir Abousselham, Okta, chief security officer says the announcement is significant as credential harvesting is becoming a bigger security concern for cloud-based organisations with more data in more locations.

“Identity is now the security team’s last control point because security can’t manage every single person, device and app; what they can control is who has access to information, and when,” he says.

“With enhancements to our AMFA solution, marking multi-factor authentication as the new standard of identity-driven security, and the ability to make smarter security decisions based on context, we’re helping to ensure the right person gets access to the right resources, at the right time.”

The Okta Identity Cloud closely monitors access behaviours to determine when there is a potential threat actor using compromised credentials to gain access to sensitive company information.

With this intelligence, organizations using Okta AMFA can detect anomalies based on the user’s location and client, such as OS and browser user agent – helping them make more intelligent access decisions based on the context of the authentication event.

Organisations with AMFA can also now use Okta’s device trust capabilities to determine whether or not an authentication event is coming from a trusted/untrusted device, ensuring only trusted devices can access business critical applications such as Office 365, Workday or Salesforce.

The company also announced that basic two-factor authentication now comes standard for every Okta user, with the company’s Single Sign On (SSO) service now coming bundled with basic 2FA.

This means Okta SSO will now include a simple one-time passcode strong authentication for all users – making two-factor authentication now the standard for everyone that uses Okta.

Story image
Asia Pacific FSIs pay $5.1 billion for breaching AML & data privacy
Financial institutions in Asia Pacific are paying a heavy price for not complying with some of the most common and widespread regulations designed to protect them and their customers.More
Story image
Imperva updates WAAP and Data Security offerings with emphasis on simplicity
New simplified subscription plans and security services have been designed to make it easier for businesses to protect critical assets from a growing volume of complex and automated threats.More
Story image
Kaseya acquires RocketCyber to bring SOC solutions to more businesses
"With this acquisition, we've doubled down on our security investments to provide our customers with access to experts who can continuously monitoring their IT environments without the cost and complexity of disparate tools.”More
Story image
Jetstack's new flagship product brings security to cloud native platforms
“With Jetstack Secure our customers can see a detailed view of each cluster and an instant visual status of all workload certificates, including their association with Kubernetes resources."More
Story image
2021 global salary guide: Cybersecurity, data analytics professionals in high demand
"Technology has been one of the most successful sectors throughout 2020 and that looks set to continue for the foreseeable future.”More
Story image
Three steps to a security-driven network for a stronger security posture
As the threat landscape continues to evolve and organisations stand to lose so much if they fall victim to an attack, it’s essential to ensure that security measures evolve in line with the network itself.More