Integrate Jamf with Okta Identity Threat Protection for true continuous conditional access

Last October, Okta announced that Jamf is a launch partner for Identity Threat Protection with Okta AI: their newest identity threat solution. What does this partnership accomplish? What does this mean for your organization? Read on to learn more about identity protection.

August 22 2024 by

Mignon Wagner

Identity threat protection with Okta and Jamf: a woman holds a locked iPhone up to her Mac screen.

The need for identity protection

As Apple adoption continues growing in the enterprise, bad actors have turned their sights onto this larger attack surface, developing and reiterating attacks to outsmart Apple’s native security protections. These attacks are growing both in terms of numbers and complexity, highlighting the need for identity threat protection.

An indispensable part of organizational defense has always been identity security: a way to validate users every time they use a company-provided or personal device to access organizational data beyond a simple password. For example, Okta identity security can use biometric data like Face ID and Touch ID to ensure the person logging in is who they say they are.

Identity protection just got even better

Identity Threat Protection with Okta AI delivers real-time detection and response to identity-based threats. Not only are the user identity and security posture evaluated at login time, but the new Okta solution enables checking for threats during active sessions, no matter where the employee is. In other words, it continually assesses user risk in both new and ongoing sessions. When changes to risk tolerance are detected, it automatically responds with adaptive or pre-set policy actions such as signing the user out of all active sessions with universal logout, enforcing inline MFA or limiting access to sensitive applications.

Organizations can integrate this powerful tool into their security stack, combining the power of their existing tools with Okta’s AI technology to create a constant stream of cross-communication across their security vendors and then automate the response.

That’s where Jamf comes in.

New to Jamf?

Experience best of breed Apple security for yourself.

How the partnership works

Okta chose Jamf as a launch partner due to our platform’s unique value as a management-led security vendor, marrying powerful threat detection and remediation for Mac and mobile.

With Identity Threat Protection, integrated with Jamf Protect on Apple devices, Okta is continuously informed of changes in device risk status to adjust user access in real-time. This means systems can automatically and immediately act upon device-based threats and vulnerabilities, securing both new connections and active sessions. What is acted upon and what the consequence is can be customized by IT and Security to meet the specific needs of their organization.

This reduces the risk of unauthorized access from compromised devices, preventing bad actors from escalating attacks on tonetworks and other devices. IT and Security teams can safeguard company data and prevent data loss using Jamf’s threat detection and remediation integrated with Okta’s adaptive response actions.

The details

Jamf keeps Okta informed of a device’s security posture by continuously streaming events with every change in risk.

Device risk level

  • Jamf Protect assesses each device using customizable severity levels to meet the organization’s unique security needs, triggering an event notification to Okta.
  • Jamf risk-based access policies allow Administrators to limit network access to protected resources based on risk tolerance levels.
  • Shared Signals Framework (SSF) risk events are forwarded and visible in the Okta System Log which admins can monitor and respond to emerging threats in real-time.

What this means for organizations

The bottom line: this new product and its integration with Jamf improves your organization’s security posture by implementing continuous conditional access not only for new access but for ongoing sessions.

With Okta as a cloud identity provider and Jamf’s device management and endpoint protection, customers can achieve Trusted Access, ensuring that only trusted and authorized users on secure, compliant devices can safely establish and maintain secure access to enterprise data.

This keeps organizations and users compliant and further protects data, networks and individuals— potentially saving organizations the devastating costs and reputational damage of a data breach.

How to get it today

Jamf Protect and Okta Identity Threat Protection customers can easily get started by following the steps in our product documentation, detailing how to easily set up an SSF stream.

Once set up, you can have peace of mind that Jamf’s strong device threat detections are instantly shared with Okta to fortify your defenses against the relentless dangers of cyber threats.

Curious how Jamf and Okta collaborate for joint customers to get more out of what they have?

Learn more about our integrations.

Existing Jamf customer?

Explore Okta Identity Threat Protection.

Tags: