Administration
Identity Threat Protection with Okta AI–Now Available in Early Access
Fareed Bukhari

As digital transformation accelerates, identity has become the new perimeter. And yet legacy security tools struggle to preempt emerging identity-based threats in real-time. Traditional static defenses fail to address risks that arise from changes in user context, such as devices, locations, and behavioral patterns.


That’s why at Oktane 23, we unveiled Okta Identity Threat Protection with Okta AI (ITP) — our vision for transforming automated, intelligence-driven identity security. Now, just months later, we’ve opened up Early Access spots to bring this future closer for our pioneering customers.


Closing Post-Authentication Gaps

While securing initial access is crucial, it is no longer sufficient. Compromised sessions, even after successful authentication, can still grant attackers extensive access to valuable assets, underscoring the need for continuous identity protection. We must now secure identity constantly , addressing vulnerabilities that arise during sessions.


ITP meets this need through capabilities like Continuous Authentication. It enables configurations that constantly assess and adapt authentication requirements based on shifting user context and environmental variables. Within this system, anomalies can trigger instant security adjustments to match the evolving risk landscape.

Connecting Signals for a complete Picture

Real-time identity security can feel like navigating a maze in the dark—every signal and clue is crucial for finding the path forward. Fragmented tools create data silos, limiting visibility, while policies sprawl across misaligned security layers. 


Okta provides deep Identity security capabilities as an enterprise’s core neutral access management platform, but there’s also room for more contextual awareness. By bringing together signals from your existing security tools through our Shared Signals Pipeline as well through continuous signal collection through Okta Verify integration, ITP helps complete the puzzle. We currently ingest insights from an ecosystem of industry-leading vendors including:


  • CrowdStrike
  • Jamf
  • Material Security
  • Netskope
  • Microsoft
  • Palo Alto Networks
  • SGNL
  • Zimperium
  • Zscaler


…with many more on the roadmap 


Each of these partners contributes their unique strengths and specialized expertise in securing critical components of the modern IT ecosystem, including endpoints, devices, networks, and access layers. By synthesizing their collective threat intelligence and indicators of compromise (IOCs) with identity signals and context, we uncover sophisticated threats across the full attack surface that any one vendor would miss alone.


With an integrated fabric of diverse detection capabilities combined with Okta at the core, security gets bolstered through partnership.

Orchestrating Response Across Your Ecosystem

ITP's unmatched strength lies in its ability to unify insights and orchestrate a tailored response across the entire digital landscape. Security teams can establish automated playbooks that launch instantaneously when high-severity threats arise. This includes capabilities like:

  • Universal Logout to revoke compromised sessions across supported (and appropriately configured) apps like Slack, Box and Office 365
  • Inline actions like step-up MFA challenges when risk levels shift
  • Custom incident responses via Okta Workflows


Such coordinated reactions ensure threats are neutralized rapidly across your cloud and on-prem ecosystem. But they remain calibrated, balancing security, governance and user experience based on the contextual severity of the incident.

Early Access: Help Shape the Future

As we countdown to general availability, our Early Access program offers exclusive opportunities for forward-thinking customers:

  • Collaborate on high-value use cases, features and enhancements
  • Receive first hand training and ongoing enablement directly from our product team
  • Help optimize risk models leveraging real production Identity data


We’re seeking security-focused enterprises who’ve migrated to the Okta Identity engine, leveraging best-in-class security solutions like those mentioned earlier, and primarily Okta Workforce Identity Cloud organizations (or mixed orgs, in some situations). Join us to collaborate and co-innovate, shaping the future of identity security from integration to deployment.


With Early Access now underway, ITP brings unprecedented innovation to automated identity protection. Contact your Okta account manager today to join our select early adopter community and elevate your identity security.



The new Okta Identity Threat Protection Product Hub Page 


This is your one-stop shop to find getting-started guides, documentation, knowledge articles, and recent product enhancements. You can also see what’s trending by checking out the Featured Content, Recent Knowledge, and Recently Answered Questions sections. In addition, it’s a perfect spot to ask and seek answers to questions about the product and its capabilities.



Visit the Okta Identity Threat Protection product hub page and let us know what you think.





  • 0 Likes
  • 0 Comments
  • 777 Views