Okta, Inc. - Experts & Thought Leaders
Latest Okta, Inc. news & announcements
Jamf, the standard in managing and securing Apple at work, kicked off its 16th annual Jamf Nation User Conference (JNUC) in Denver, Colorado. Joined by key partners including Apple, Okta, AWS, Microsoft, Google and more, Jamf unveiled the latest updates to its pioneering Apple device management and security platform. Those updates include a rich API ecosystem, intelligent AI tools, and automated software updates powered by Declarative Device Management, making the Jamf platform more powerful and flexible than ever before. API ecosystem and intelligent AI tools “We’re thrilled to welcome Jamf Nation to Denver for JNUC,” said John Strosahl, CEO of Jamf. “This year marks a major evolution in how customers engage with Jamf." "Our flexible, extensible platform is powered by a rich API ecosystem and intelligent AI tools. These capabilities make it easier than ever for organisations to fully realise the potential of the Apple ecosystem — with features that matter, integrate seamlessly, and work the way customers need them to.” New capabilities and workflows Under the theme of “elevate,” Jamf is once again delivering new capabilities and workflows that matter most to organisations deploying and securing Apple devices. The key highlights from JNUC 2025 include: Platform API ecosystem to power a more dynamic, flexible Apple experience Jamf is evolving its platform into a more dynamic and flexible foundation for innovation With the launch of its new Platform API ecosystem, Jamf is evolving its platform into a more dynamic and flexible foundation for innovation. The new APIs empower developers, IT, and security teams to streamline automation, reduce integration complexity, and unlock new possibilities for managing and securing Apple devices at scale. Jamf is expanding on its already robust API framework to provide a unified and predictable way to build across the entire Jamf Platform. Platform APIs are designed to adapt seamlessly to each organisation’s environment, integrations, and workflows, giving customers more control and flexibility. For developers, Platform APIs offer a consistent and intuitive experience, making it easier to build with confidence. For IT and security teams, Platform APIs simplify automation and custom workflows, helping organisations unlock greater efficiency and value. For technology partners, Platform APIs enable deeper integrations and open access to the full depth of Jamf capabilities, enabling more powerful apps and solutions that extend the Jamf ecosystem. New security skill for the AI assistant in Jamf Protect Jamf also announced a forthcoming AI Assistant feature, the Security Skill for Jamf Protect, extending the company’s AI Assistant technology to security teams. New capability enables security teams to cut through alert fatigue and focus on what matters most Building on the Search and Explain Skills introduced earlier this year in Jamf Account and Jamf Pro, the Security Skill will analyse telemetry, correlate events, and deliver plain-language guidance to help teams triage alerts more effectively. By simplifying complex frameworks such as MITRE ATT&CK and CVE references into actionable insights, the new capability enables security teams to cut through alert fatigue and focus on what matters most. New Apple capabilities and automated software updates Jamf also expanded its Blueprints solution, first introduced at JNUC 2024, with new workflows designed to streamline Apple device management through Declarative Device Management (DDM). The latest addition, the Automated Software Update Settings declaration, enables devices to self-manage operating system updates based on policies defined once by IT. This “set it and forget it” workflow removes the need for repeated checks, scripts, or manual intervention, while giving administrators control over parameters such as user permissions, deferral periods, and beta version access — ensuring consistency, compliance, and reduced administrative overhead. Apple’s Platform Single Sign-On Jamf announced its support for this enhancement with pioneering identity partners to make this happen Apple’s Platform Single Sign-On optimises the enterprise authentication experience on the Mac, starting with synchronising local passwords with cloud IDP accounts, then extending that single sign-on for authentication to native and web apps. The latest enhancement delivers Platform SSO right out of the box, with streamlined delivery of identity workflows before the user ever gets to the desktop. Jamf announced its support for this enhancement with pioneering identity partners to make this happen as part of same-day support for macOS 26. Jamf's mission-critical environments Jamf helps well over 75,000 organisations, across 100 countries, manage and secure over 30 million devices. From hospitals to schools, banks to retail stores, manufacturing floors to airlines — they serve some of the most mission-critical environments in the world, representing approximately 65% of the Fortune 500.
Identity-based cyber attacks continue to prevail and impact organisations. Stealing credentials was the top initial action in breaches, according to Verizon. Plus, 84% of identity stakeholders surveyed said identity-related incidents directly impacted their business, resulting in reputational damages, distraction from core business, and increased recovery costs. Key components of integration It is more important than ever to safeguard sensitive data from identity-based attacks. For this, defenders need threat context from their security tools combined with data context – information on what is being targeted. To help with this challenge, Rubrik has partnered with Okta. Rubrik Security Cloud will provide Okta Identity Threat Protection with critical user context to accelerate threat detection and response. In this blog, they will learn about the key components of this integration from Rubrik and Okta and why organisations can benefit from it. Changes in sensitive data access Rubrik can detect changes in access to sensitive data, helping accurate and timely risk-level assessments When it comes to safeguarding data from identity-based attacks, knowing which users have access to sensitive data and how user access changes over time are important. Rubrik Security Cloud provides organisations with unparalleled visibility into user access to sensitive data. It identifies and analyses user access factors and changes to these factors, individually and in combination. Depending on the level of sensitivity of data a user can access, the user will be assigned a certain risk score (high/medium/low/none). Access to sensitive data Rubrik can detect changes in access to sensitive data, enabling accurate and timely risk-level assessments. This functionality is crucial for organisations to maintain control over their data, enforce least privileged access, and ensure that only authorised users have access to sensitive information. Empowering Okta with critical user risk context Rubrik shares with Okta important user context such as email and the types of sensitive files they have accessed. By combining Rubrik's user access risk signals with threat context from other security products used by an organisation (e.g., Endpoint Detection and Response or EDR), Okta can determine overall risk levels more effectively and automate threat response actions to mitigate identity-based threats. Shown in the diagram is a high-level overview of how the integration works: Rubrik knows the user’s identity based on information from Microsoft Active Directory Rubrik Security Cloud assigns the user a risk level based on the sensitivity of the data they can access. When Rubrik detects a change in a user’s risk level, it shares this with Okta Identity Threat Protection, which can then take a response action. Okta automated threat response Okta can accurately determine overall risk levels and automate threat response accordingly When Okta Identity Threat Protection combines Rubrik's user risk signals with other security signals, Okta can accurately determine overall risk levels and automate threat response accordingly. For example, it can take actions on a high-risk user such as logging them out of a certain device or requiring re-authentication. These remediation steps help mitigate potential threats by revoking access or prompting additional verification when suspicious activity is detected. Upon learning about user risk changes, Okta can take an action on potential threats, reducing the operational burden on security teams. Benefits of the Rubrik and Okta integration The integration of Rubrik Security Cloud with Okta Identity Threat Protection offers several significant benefits for organisations seeking to enhance their data protection and streamline threat response processes. Firstly, it provides continuous visibility into user access to sensitive data, enabling organisations to monitor changes in access permissions and accurately assess risk levels in a timely manner. This helps them maintain control over sensitive data. Okta’s automated remediation actions Additionally, the integration alleviates the operational burden on security teams Secondly, the integration facilitates faster threat response and remediation. By seamlessly sharing user risk level changes to Okta Identity Threat Protection, the integration enables Okta’s automated remediation actions, such as logging out users or requiring re-authentication. This proactive approach significantly accelerates threat response, thereby enhancing the overall security posture of the organisation. Additionally, the integration alleviates the operational burden on security teams. By Okta helping automate response actions, security professionals can focus their efforts on more strategic tasks, rather than being overwhelmed by manual processes. This increased efficiency translates into improved productivity and a more effective allocation of resources. Rubrik's user access risk signals Finally, the Rubrik-Okta integration fosters enhanced visibility across the security ecosystem. By combining Rubrik's user access risk signals with threat intelligence from other security products, Okta can determine overall risk levels more effectively. This comprehensive risk assessment enables organisations to gain a holistic view of their threat landscape, allowing for more informed decision-making and proactive threat mitigation strategies. Pioneering Integration and Innovation Rubrik is the first and only data security platform vendor to integrate with Okta Identity Threat Protection. The integration leverages OpenID Foundation Shared Signals Framework. By utilising this framework for receiving user risk signals from Rubrik, Okta can then automate response and remediation, thereby providing a proactive stance against potential security threats. By leveraging Rubrik's data security capabilities and Okta's identity protection solutions, the integration aims to set a new standard in identity threat response.
Zimperium, the global pioneer in mobile security, is proud to announce that it’s collaborating with Okta, the independent identity provider to deliver a significant advancement in identity threat protection for mobile devices. By integrating Zimperium Mobile Threat Defence (MTD) with Okta Identity Threat Protection with Okta AI, the companies are setting a new standard in continuous risk monitoring and enabling automated threat response, providing organisations with unparalleled mobile security and on-device operational efficiency. Zero-trust framework The sophistication and rapid evolution of modern mobile threats highlight the need for constant scrutiny and attention within a zero-trust framework. Corporate devices and the environments in which they operate are constantly changing and require an active, run-time threat protection solution to always know the exact risk posture of the device. Mobile Threat Defence (MTD) product This integration helps detect threats by continuously assessing and sharing mobile devices’ threat and risk posture Zimperium’s industry-pioneering Mobile Threat Defence (MTD) product, designed to assess the full breadth of the mobile attack surface, including device, network, application, and Web threats, integrates real-time threat intelligence and rich threat context into the Okta Identity Threat Protection platform. This integration helps detect threats by continuously assessing and sharing mobile devices’ threat and risk posture to enable shared customers to take action in real time when a threat is detected automatically. Real-time mobile threat detection Zimperium is one of the initial integration security event providers for Okta Identity Threat Protection with Okta AI. The integration provides real-time mobile threat and risk intelligence for managed and unmanaged devices, a core component of a zero-trust architecture. By sharing continuous risk posture data with Okta, organisations have the necessary insights required to enforce strong identity and access controls and to configure the service to automatically respond to threats. This represents a modern and necessary requirement for a strong zero-trust architecture. Identity threat protection Through this powerful integration, Zimperium’s industry-pioneering MTD solution integrates seamlessly with Okta’s Identity Threat Protection platform to empower organisations with: Real-Time Threat Intelligence: Zimperium delivers rich threat context and real-time threat intelligence to Okta customers, facilitating faster and more informed risk assessments. Comprehensive Mobile Threat Protection: Zimperium’s On-Device Dynamic Detection Engine is a comprehensive, multi-layered detection engine that utilises machine and deep learning, behavioral analysis, and deterministic techniques to provide a holistic and dynamic threat defence system for mobile devices. Zimperium’s MTD solution covers the entire mobile attack surface, including devices, networks, applications, and web traffic. This holistic approach allows organisations to identify and mitigate a wide range of mobile threats. Automated Countermeasures: By sharing threat signals with Okta, Zimperium enables organisations to enable automated responses to identity-based threats. This can include actions like multi-factor authentication prompts or session termination, significantly reducing the window of vulnerability. Stronger Zero-Trust Security: Zimperium provides real-time intelligence for both managed and unmanaged devices, making it a perfect fit for zero-trust architectures. Continuous risk posture data from Zimperium empowers Okta to enforce strong identity and access controls, further strengthening zero-trust security. Automatic remediation and response “Organisations need the ability to bring together risk insights at the point of login and re-evaluate at any point in a user’s session,” said Stephen Lee, Vice President, Technical Strategy and Partnerships. “Identity Threat Protection extends Okta’s adaptive risk analysis and enables automatic remediation and response, helping businesses stop potential threats in real-time. By integrating with Zimperium, we can extend our risk ingestion on an attack surface that Okta does not fully cover.” Robust security postures “As organisations adopt new technologies, effective on-device security is more crucial than ever,” said Shridhar Mittal, CEO of Zimperium. “Our work with Okta enhances our ability to provide real-time protection against identity threats." "Together, we empower enterprises to stay ahead of evolving threats and maintain robust security postures. We encourage current Okta customers to explore these new security enhancements and strengthen their mobile security strategies.” Security signal sharing Okta Identity Threat Protection is built with Okta AI and powered by insights pulled from an organisation’s security stack. In real-time, it detects and responds to identity threats, depending on a customer’s service configuration, during and after authentication, amplifies security signal sharing across the ecosystem, and orchestrates remedying actions. The solution is generally available for Workforce Identity Cloud customers worldwide.
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download