Automating Security Operations with Okta Workflows
Human actors still drive the vast majority of security breaches. In 2022, 82% of breaches involved the human element, whether it was the use of stolen credentials, phishing, misuse, or simply an error, according to Verizon's Data Breach Investigations. Yet, humans alone cannot protect against these threats. Security automation is critical to removing human error and responding instantly to threats from internal and external actors alike.
To help you automate security tasks, Okta offers solutions that include Okta Workflows identity automation and orchestration. The Okta platform already includes many capabilities that help protect your organization and your customers, including multifactor authentication (MFA), single sign-on (SSO), and passwordless authentication. Okta Workflows provides additional security capabilities that allow customers to automate security tasks and extend what the Okta platform does out of the box…
The Cyber Hut Comment: There are some interesting items to unpick from this promotional blog by Okta on a relatively new feature for them called Okta Workflows. As identity is now becoming the backbone for both business and security operations, a few patterns start to emerge. Firstly identity data becomes part of a bi-directional pipeline that integrates with an array of potentially new data points.
Keep reading with a 7-day free trial
Subscribe to IAM Radar - Identity & Access Management Vendor Intelligence to keep reading this post and get 7 days of free access to the full post archives.