Secure Enterprises and Preempt Threats with Conditional Access

READ MORE

Platform

Technology Integrations

Preempt works closely with leading security vendors to develop integrations that make it possible for customers to gain more out of their existing investments for secure Conditional Access, on premises and in the cloud.

Featured Integrations

spunk-phantom-logo

Splunk Phantom

Preempt and Phantom integrate to achieve an adaptive solution that can quickly address incidents and automate resolution. Both Preempt and Phantom are built to harness security investments to achieve automation and response to security threats, but they do so in very different ways. Preempt monitors traffic in real time to identify threats based on identity, behavior and risk; then using this data, Preempt delivers a real-time Conditional Access strategy that prevents and responds to threats. Phantom provides security orchestration, automation and response across all of the enterprise security investments. When the two platforms join forces, customers benefit from a powerful solution for security operations.

Learn More

Duo Trusted Access

By integrating the Preempt Platform with Duo, security teams can create automated responses that challenge suspiciousbehavior, confirm or resolve  the alert, and take appropriate preventative action – all without manual intervention from staff. Additionally, since Preempt acts as an LDAP proxy, staff can use Preempt to integrate multi-factor authentication into virtually any application.
The Preempt solution continuously monitors and learns the behavior of every account and device in the network to identify risky behavior and threats such as compromised accounts, malware infection, lateral movement or malicious insiders. However these detections are just the first step. Preempt can then trigger Duo to push a two-factor authentication challenge. Then, based on the result, the policy engine can either approve and auto-resolve the event or take a different action such as block.

Learn More

Azure Active Directory and MFA

The combination of Preempt’s security platform and the single sign-on (SSO) of Microsoft’s Azure AD allows organizations to extend the industry’s most advanced threat detection and adaptive response capabilities to their web and cloud-based applications. The Azure AD connector allows Preempt to track and learn user behavior on any application that uses Azure AD. This provides staff with a unified view of a user’s behavior both when they are on site as well as when connected to cloud applications. This enables Preempt’s detection and classification models to likewise extend to cloud-based assets.

Learn More

Symantec VIP

By integrating the Preempt Platform with Symantec VIP, security teams can create automated responses that challenge suspicious behavior, confirm or resolve the alert, and take appropriate preventative action – all without manual intervention from staff. Additionally, since Preempt acts as an LDAP proxy, staff can use Preempt to integrate multi-factor authentication into virtually any application. The Preempt solution continuously monitors and learns the behavior of every account and device in the network to identify risky behavior and threats such as compromised accounts, malware infection, lateral movement or malicious insiders. However these detections are just the first step. The Preempt Policy Engine can then trigger Symantec VIP to push a two-factor authentication challenge. Then, based on the result, the policy engine can either approve and auto-resolve the event or take a different action such as block or demote the user.

Learn More

Aruba ClearPass

Preempt integrates with Aruba ClearPass to be able to provide a Network Access Control method of response to threats. By integrating Preempt with Aruba ClearPass, joint customers can leverage both solutions to detect anomalies and enforce actions at the entry point to the network. The integration is automatically supported by Preempt’s detection mechanisms, and provides state of the art advanced adaptive response utilizing Aruba ClearPass capabilities.

Learn More

Centrify MFA

Preempt integrates with Centrify MFA to provide a range of authentication methods that adds a second layer of security to access request. Choose from push notification to a smartphone, soft token OTP generated by the Centrify mobile app or sent via SMS/text message, interactive phone call, security questions etc. – to verify the user’s identity. Using Centrify MFA, enterprise get the protection they need without sacrificing the convenience their users demand. Centrify MFA makes two-factor authentication easy for both administrators and users.

Learn More

Demisto Platform

  • Timely, accurate, relevant and consumable human-vetted threat intelligence delivered as machine-readable threat intelligence by PhishMe Intelligence and ingested into Demisto Enterprise.
    • Bi-directional event enrichment and adaptive enforcement that adapts based on situational context.
    • Automate enrichment of alerts as playbook tasks: add or remove users from watchlists, get alert and endpoint details, get time-based activities, and so on.
    • Leverage hundreds of Demisto product integrations to further enrich Preempt alerts and coordinate response across security functions.
    • Run thousands of commands (including for Preempt) interactively via a ChatOps interface while collaborating with other analysts and Demisto’s chatbot.
Learn More
Google Authenticator Logo

Google 2-Step Verification

By integrating the Preempt Platform with Google Authenticator, security teams can create automated responses that challenge suspicious behavior, confirm or resolve the alert, and take appropriate preventative action – all without manual intervention from staff. Additionally, since Preempt acts as an LDAP proxy, staff can use Preempt to integrate multi-factor authentication into virtually any application.
The Preempt solution continuously monitors and learns the behavior of every account and device in the network to identify risky behavior and threats such as compromised accounts, malware infection, lateral movement or malicious insiders. However these detections are just the first step. The Preempt Policy Engine can then trigger Google Authenticator to send the user an authentication challenge code. Then, based on the result, the policy engine can either approve and auto-resolve the event or take a different action such as block.

Learn More

Okta Single Sign-On and Adaptive MFA

Preempt’s integration with Okta helps customers optimize their security investments so they can benefit from unified visibility and adaptive enforcement in any environment. By leveraging Preempt for Okta, security teams can extend their visibility to all systems and applications and automatically protect them from attacks and insider threats without disrupting end-user experience.

Learn More

Palto Alto Next Generation Firewall

Preempt integrates with Palo Alto Networks to provide user and device information to help restrict access to risky traffic going in and out of the network.

Learn More

Ping Identity Single Sign-On

Preempt and Ping have partnered to give organizations the ability to extend conditional MFA to any network resource and any Ping-federated application, on-premises and in the cloud. This means that legacy, custom, or cloud applications can all be protected with conditional access without the need for agents or customization.

Learn More

RSA SecurID

By integrating the Preempt Platform with RSA SecurID, security teams can create automated responses that challenge suspicious behavior, confirm or resolve the alert, and take appropriate preventative action – all without manual intervention from staff.
The Preempt solution continuously monitors and learns the behavior of every account and device in the network to identify risky behavior and threats such as compromised accounts, malware infection, lateral movement or malicious insiders. However these detections are just the first step. The Preempt Policy Engine can then challenge any affected users to provide a code from their SecurID hardware token. Then, based on the result, the policy engine can either approve and auto-resolve the event or take a different action such as block.

Learn More

SecureAuth idP

By integrating the Preempt Platform with SecureAuth IdP, security teams can create automated responses that challenge suspicious behavior, confirm or resolve the alert, and take appropriate preventative action – all without manual intervention from staff. Additionally, since Preempt acts as an LDAP proxy, staff can use Preempt to integrate multi-factor authentication into virtually any application.
The Preempt solution continuously monitors and learns the behavior of every account and device in the network to identify risky behavior and threats such as compromised accounts, malware infection, lateral movement or malicious insiders. However these detections are just the first step. The Preempt Policy Engine can then trigger SecureAuth to push a multi-factor authentication challenge. Based on the result, the policy engine can either approve and auto-resolve the event or take a different action such as block.

Learn More
Gemalto-preempt-integration

Gemalto

Preempt allows you to challenge authentication attempts anywhere — on-premises and in the cloud — with Gemalto MFA, ensuring only the right users have the right access.

Learn More

Request a Demo Today

Let Preempt help you catch security threats before they happen.

LET’S DO IT