Proofpoint Recognized as One of the Fastest Growing Apps in Okta’s Businesses @ Work 2019 Report

Share with your network!

Okta, an independent provider of identity for the enterprise, recently recognized Proofpoint as one of the fastest growing apps available within Okta’s network of 5,500+ pre-built integrations with cloud and on-premises systems.

Based on data from more than 5,600 Okta customers, Proofpoint’s high download ranking underscores the company’s exceptional security effectiveness, as well as its ease of integration with a wide array of security partners.

Proofpoint and Okta’s Partnership

Credential phishing attacks are a mainstay in the cybercriminal arsenal because they continue to work. One well-crafted credential phishing email is all it takes to impersonate an employee and expose an entire organization and its customers to substantial risk. According to Proofpoint research, email-based corporate credential phishing attacks quadrupled in Q3 2018 compared to the previous quarter.

The Proofpoint/Okta partnership combines best-of-breed solutions to provide organizations with an accurate, timely response to credential phishing attacks. With Proofpoint’s Threat Response Auto-Pull (TRAP) and the Okta Identity Cloud, security teams can automatically layer additional authentication security to ensure users who clicked on a phishing URL do not have their accounts compromised.

Once these two solutions are linked, Proofpoint TRAP detects when a user has clicked on a malicious URL and has accessed the web page. Security teams can then automatically enable step-up authentication for the account to mitigate the risk of compromise. The user must then reauthenticate to confirm his or her identity, using multiple factors and according to policy, before accessing any corporate system.

For more information on the Proofpoint/Okta partnership, please visit: https://www.proofpoint.com/us/partners/technology-alliance-partners and https://www.proofpoint.com/sites/default/files/pfpt-us-ds-proofpoint-okta-partnership.pdf.  Additional  information on how to stop credential phishing attacks is also available here: https://www.proofpoint.com/us/resources/white-papers/credential-phishing-hook-line-and-sinker.

Subscribe to the Proofpoint Blog