Monitor and Prevent Credential-Based Threats to Your Cloud Infrastructure
Cloud is a world without a perimeter. Attacks on services hosted in the cloud are a lot easier to perpetrate than attacks on on-premises services because there are more protections available for on-premises services. Cloud authentication systems are vulnerable to external cyberattacks such as dictionary password attacks, account takeover attempts, and others. Compromised credentials can lead to data leakage from your critical cloud applications and services.
Analyzing Okta authentication events alone may not give you a comprehensive view of the full extent of the cyber threat your organization is facing. Securonix combines events from Okta with logs from your cloud and on-premises applications to provide an end-to-end view into the threat.
Key use cases include:
Detect login anomalies
Detect password attacks
Identify account compromise, including account sharing
Detect access anomalies, including excessive permissions and weaker authentication policies compared to peers
Identify admin privilege misuse, including permission escalation, misuse, etc.
Enforce multi-factor authentication
Risk-Based Monitoring and Data Insights
Many organizations are moving their applications and data to cloud. However, not many have the correct security monitoring to detect and prevent advanced cyber threats in cloud. By combining the strong authentication capabilities of Okta with the advanced behavior analytics of Securonix, organizations can seamlessly monitor and prevent advanced cyber threats.
In addition to the analytics, Securonix also provides a dashboard to enable users to quickly view and analyze authentication events.
Intelligent Incident Response
Upon detecting a threat, Securonix has the ability to respond by enforcing policies in Okta to immediately suspend user access or to to challenge the user to verify their credentials (for example, requiring two-factor authentication).