Datasheets

Okta_Cloudlock_Datasheet

Issue link: https://learn-umbrella.cisco.com/i/871541

Contents of this Issue

Navigation

Page 0 of 1

With the meteoric growth of cloud-based applications and the data that fuels them, and a newly mobile global workforce, it's more important than ever to ensure that every user accessing cloud apps is authorized—and that they're acting appropriately once they've gained access. Okta and Cisco Cloudlock have partnered to safeguard cloud-based data, and protect against hacks and compromised accounts. Okta and Cisco Cloudlock combine Cisco's cloud-native Cloud Access Security Broker (CASB) platform with Okta's integrated identity as a service (IDaaS) tools to create robust protection for the cloud, from the cloud. Okta connects and protects employees of many of the world's largest enterprises and also securely connects enterprises to their partners, suppliers, and customers. Cisco Cloudlock protects data, and apps in the cloud by providing a policy-based, automated approach to detect risks and take remediating steps, such as quarantining files and revoking external shares. Working together, these industry-leading applications make identity management and data protection an integral part of your cloud security strategy. How it works Okta with Cisco Cloudlock protects your end users and cloud applications such as Salesforce, Box, and Office 365. An end user logs in and authenticates with single sign-on through Okta, which centralizes control over access entitlements and sign-on security. Cisco Cloudlock complements Okta by providing control over what's going on in the cloud environment, once a user has successfully logged in. The Okta/Cisco Cloudlock integration is seamless and transparent to the end user—as long as their behavior isn't out of the ordinary. If the end user Okta and Cisco Cloudlock: User, Content, and Data Security for the Cloud Ok ta Datasheet: Ok ta and Cisco Cloudlock 1 does something irregular, such as downloading every contact from Salesforce, Cisco Cloudlock will detect the suspicious activity, take action (such as send an admin notification), and alert Okta. Okta can then move the user to a high-security group, and trigger one or several native actions, such as terminating all open sessions and forcing the user to log back in, forcing a multi-factor authentication challenge, or taking other action, depending on how policies and protocols have been set. Okta & Cisco Cloudlock Orchestrated Security User login through Okta 1 2 3 4 Cloudlock detects suspicious behavior Cloudlock informs Okta to attribute user to new risk group Okta applies security measures such as MFA and lock-out user

Articles in this issue

view archives of Datasheets - Okta_Cloudlock_Datasheet