Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Identity Threat Protection with Okta AI Demo

Okta
04/06/2026
18
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Okta ITP provides continuous session monitoring and automated threat response after user authentication, addressing security gaps that occur during active application usage.
  • Integration with Zscaler Deception enables real-time threat detection that triggers immediate forced logout across all active sessions, including Okta dashboard and connected applications like Salesforce and Google Cloud Console.
  • Entity Risk Policies automate security responses by terminating compromised sessions instantly, limiting potential damage from unauthorized access and data manipulation while minimizing organizational risk exposure.

Summary

This demonstration showcases Okta Identity Threat Protection with Okta AI (ITP), a solution designed to protect user sessions after authentication through continuous risk assessment and automated response capabilities. The demo illustrates how Okta ITP integrates with third-party security solutions like Zscaler Deception to detect threats in real-time and automatically terminate all active application sessions for compromised users. When Zscaler Deception identifies a threat, the information is immediately transmitted to the ITP risk engine, triggering an Entity Risk Policy that forces logout across all applications including the Okta end-user dashboard, Google Keep, Salesforce, and Google Cloud Console. This post-authentication security approach addresses a critical gap in identity security by limiting damage and minimizing risk when sessions are exposed to threats, demonstrating how organizations can extend protection beyond the initial authentication moment to cover the entire session lifecycle.

Chapters

0:00 - Identity Threat Protection Overview
1:10 - Entity Risk Policy Configuration
1:35 - User Login and Session Setup
2:10 - Threat Detection and Forced Logout
2:37 - System Log Review

Key Quotes

0:15 "By the continuous risk assessment and automatic response function of the session."
0:53 "The application session used by a user exposed to a threat is the cause of unauthorized access and data alteration."
3:11 "By using the ITP like this, you can deal with the threat of the session after logging in in real time."

Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Identity & Access
  • Threat Intelligence
  • Security Operations
  • Demo
  • Technical Deep Dive
  • Identity Threat Protection
  • Session Security
  • Automated Threat Response
  • Third-Party Security Integration
  • Zscaler Deception
  • Forced Logout
  • Risk Assessment
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Identity Threat Protection with Okta AI Demo

              Upcoming Webinar Calendar

              • 05/27/2026
                10:00 AM
                05/27/2026
                Harnessing AI: Transforming Illusion into Purposeful Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-illusion-into-purposeful-control/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-2026s-threat-landscape/
              • 06/10/2026
                12:00 PM
                06/10/2026
                Deciding Between Purchasing and Developing Solutions
                https://www.truthinit.com/index.php/channel/1983/deciding-between-purchasing-and-developing-solutions/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Which Issues to Address First?
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-which-issues-to-address-first/

              Upcoming Events

              • May
                27

                Harnessing AI: Transforming Illusion into Purposeful Control

                05/27/202610:00 AM ET
                • May
                  28

                  Harnessing AI for Smaller Teams: Strategies for Secure Implementation

                  05/28/202601:00 PM ET
                  • Jun
                    02

                    Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape

                    06/02/202601:00 PM ET
                    • Jun
                      10

                      Deciding Between Purchasing and Developing Solutions

                      06/10/202612:00 PM ET
                      • Jun
                        16

                        Transforming Data Risk into Actionable Priorities: Which Issues to Address First?

                        06/16/202607:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version