Oort is now part of Cisco  |  Learn more

Try it free

Our Blog

Think, Share & Learn

User Linkage Suggestions 

This week, we’re excited to introduce User linkage Suggestions within Cisco Identity Intelligence, adding another layer of visibility for our users. We’ve observed instances...

New Okta Workflow Connector

We’re thrilled to announce that our Okta Workflow Connector is now live in production for Okta workflow users. Setting up an API client within the Cisco Identity...

User Overview User Integration Updates 

We are continually working to enhance the user experience on the User360 profile by ensuring all pertinent information is readily available. In this release,...

Cisco Identity Intelligence User Interface Updates 

If you’ve recently logged into the Cisco Identity Intelligence platform, you may have noticed some exciting changes. In this release, we’re...

New User Activity Flow Widget  

In this release, we are introducing the ‘Activity Flow over the Past 30 days’ widget on the Users Overview tab. This feature provides a visual representation of users’...

Cisco Identity Intelligence Webex Notification Integration

As you might be aware, we currently offer the Slack integration, allowing you to set up Slack as a notification target. We are thrilled to...

We are back this week after an exciting time last Week at Cisco Live. This week's release brings new checks, filters around failing integration checks, and more. Read on to learn more about the...

Read on to learn more about the features and updates we've released this week.

Read on to learn more about the features and updates we've released this week.

Read on to learn more about the features and updates we've released this week.

The New Year kicks off with new checks, a "is known good IP" indicator, and much more. Read on to learn more about the features and updates our engineering team has released this week.

In this week’s release, we’re providing more options for configuring custom mail eproviders.

It’s a bumper update this week, so read on to learn more about integrating your own mail provider, monitoring Entra ID bypass codes, and much more.

In this release, we’ve mapped all MFA types to assurance levels. Read on to learn about how you can use this information!

This week we’re introducing two new checks, a “registered location” tag, and more. Read on to learn about the features our engineering team has released this week. 

There have been plenty of exciting releases to get excited about over the last year. However, this is particularly exciting and my personal favorite.

This week, we’re very excited to release the new Devices tab, which has been hotly anticipated and will be a welcome addition for many of you–especially those focused on building their zero trust...

In this week’s release, we’re providing new ways to operationalize Oort’s checks. Read on tolearn more!

With the continued targeting of support teams, we’re making it even easier for IT Help Desk teams to verify users’ identities. Read on to find out more!

Come, gather, and read about all of Oort’s goodness we’re releasing to you this week!

Read on to enjoy this latest week’s Oort product updates!

In this week’s release, we’ve provided numerous shortcuts to save you time when investigating failing users.

In this week’s release, we’ve introduced new workflows to make it even easier to ensure you’re benefiting from the latest capabilities. 

With the rise of phishing-resistant tools like passkeys, securing accounts with Multi-Factor Authentication (MFA) is more effective than ever. However, cybercriminals are targeting the weakest link –...

If you read “Week 37” and panicked that you missed Week 36, fear not! The team was busy onboarding with Cisco, following the official announcement of Cisco’s acquisition of Oort two weeks ago.

But...

This week’s release is all about a new check – Impossible Travel. We’ve been holding off on this one while our data science team has worked their magic to ensure this is an impossible travel...

Today, Cisco has completed the acquisition of Oort, expanding Cisco’s ability to secure the identity perimeter. Given that Duo is already a well-respected product within the identity space, Oort...

There’s a strong “data exfiltration” vibe to this week’s release notes. Read on to learn about two new checks, as well as a new customization option for Personal VPN Usage.

Today, we’re unveiling our new integration with Polarity.For those of you unfamiliar with Polarity, it’s awesome. The premise is simple but powerful. Organizations have a ton of data that can be...

Integration supports investigation, incident response, and security operation workflows

In this week’s release, we have enhanced explainability, auto-domain discovery, and a smattering of smaller but mighty updates!

Today marks the official rollout of our new integration with AWS. This is the latest integration this year, hot on the tail of our announcements around GitHub and Salesforce. Our goal remains the...

Complements existing integrations to add new protections for identities in AWS

In this week’s release, we’ve introduced saved filters for the users tab, a new action for IT help desk teams, and even more context for checks. Read on, and enjoy!

Identity threats are evolving, and staying a step ahead is paramount. 

This week's exciting updates are all about checks, ranging from extended coverage to a brand new check.

In case you missed it, there’s been a lot of talk surrounding new SEC rules on cybersecurity incident disclosure. 

Last week, Gartner released Hype Cycle for Security Operations, 2023, which included Identity Threat Detection and Response (ITDR) at the latter stages of the “Innovation Trigger” category. 

There was plenty packed into the last week for you to enjoy, including a new check to identify users sharing authenticators. The headline item, however, is the introduction of Oort webhooks that...

Last week, I saw a post from Richard Bird, Chief Security Officer at Traceable. It was simple, effective, and perfectly crystalized some recent thoughts on identity security. He wrote, “ITDR is the...

This week’s release notes have it all: new checks, new context, extended coverage. Whether you’re an Okta, Azure AD, or Duo – there’s plenty for you to enjoy. Read on to learn more.

Are you tired of relying on SIEMs and still failing to generate valuable insights from your data? Concerned about the increasing costs of your SIEM? Are you looking to understand how to get...

Last week was an exciting week, with Cisco announcing its intent to acquire Oort. This week, however, still includes a number of updates to help you manage your identity population. 

Not many know the true story of Oort. We never set out to solve the crisis in Identity Security, at least not at first. Customer obsession led us down this path, away from network security, and...

The Oort Data Science team recently discovered a series of concerning events on GitHub. Within a span of less than 24 hours, a team member extended an invitation to an external account, which was...

Powerful new capabilities to secure individual and outside collaborator identities

Despite the dampened mood from the weather ruining a few BBQs and fireworks last week, fret not! There are some exciting new updates to check settings and security framework mapping for you to sink...

This week you can enjoy a new check, extended coverage of our GitHub Beta release, and enhancements to Check pages that make it easy to customize and operationalize insights from Oort.

In homage to this week’s sparkling new dark mode, these release notes will exclusively use screenshots in dark mode to illustrate our other new capabilities. Enjoy!

Welcome to the latest release notes for Oort! We have some great new features, integrations, and improvements to share with you. Let's dive right in:

Security leaders have realized they must prioritize the security of their identities and user accounts. A robust identity security program is essential to protect sensitive information and prevent...

Detecting identity threats is an important step, but an effective response is equally crucial. Organizations should establish clear processes and playbooks to respond to identity-related incidents....

Identity Threat Detection and Response (ITDR) plays a crucial role in modern identity security strategies. To effectively detect and respond to identity-related security incidents, organizations must...

Identity plays a vital role in modern security frameworks and is a fundamental component of any robust zero trust strategy. To ensure the integrity and protection of sensitive data and resources,...

Multi-factor authentication (MFA) is a widely recognized and essential security measure that adds an extra layer of protection to user accounts. While many organizations understand the importance of...

In today's digital landscape, managing multiple usernames and passwords across various systems can be a daunting task. Single sign-on (SSO) systems offer a solution by allowing users to authenticate...

In today's digital landscape, where organizations heavily rely on technology and automation, managing machine identities has become a crucial aspect of identity security. Machine identities, also...

An effective identity security program requires the collaboration of various stakeholders, each with their own roles and responsibilities. These stakeholders play a crucial role in ensuring the...

As organizations face increasing threats to their digital assets, the need for a comprehensive and robust identity security program has become paramount. To effectively address the challenges...

Oort publishes first edition "Blueprint for Building an Identity Security Program" handbook aimed at helping identity practitioners build successful programs to reduce their attack surface and...

Exciting updates this week! Introducing the "Link User" capability for consolidated user management, a powerful "Compromised Session" check, and the ability to snooze notifications for failing users....

Following an exciting week at Identiverse 2023, we’re starting off the week with a flurry of new capabilities. This week, our headline item is a new check for monitoring activity from untrustworthy...

There are some cool new updates for those of you using Azure Active Directory, as we’re now collecting more data types and providing monitoring for accounts using weak forms of multi-factor...

The term “zero trust” was first coined in 2009 by John Kindervag. It’s a “trust but verify” approach that is related to defense-in-depth strategies and the principle of least privilege. In...

The latest updates to the Oort Identity Security Platform will help you to customize, visualize, and operationalize Oort’s identity insights. Read on to learn more!

In this interview, Matt Caulfield, Founder and CEO at Oort, and Didi Dotan, CTO at Oort, discuss the important differences to protecting service accounts and what organizations must do to ensure...

This week we’ve released a new check that helps you to detect when employees are using personal VPNs that may be against your corporate policy. Read on to learn more!

Identiverse is right around the corner. Like most, I am sitting down to plan my calendar and getting more inspired than ever about the direction our industry is heading. For others trying to...

Oort Identity Security Platform now available on Auth0 by Okta Marketplace, making secure access and identity security easier than ever to implement.

There are plenty of updates to read about this week, including more context on IP addresses and enhancements to the dashboard. Most notably, you’ll now see an additional remediation action for...

Guest accounts in Azure AD are identities belonging to external users invited to collaborate with the organization. Inviting guest accounts into your organization can be as simple as sending a link...

New Relationship Provides Quick and Cost-Effective Way for Security Teams to Access Deep Insights on Workforce Identities

Building on last week’s release of Oort advanced query language, we’ve released even more platform capabilities for our power users. We’ve got more filters in the networks tab, more check...

Over the past months, we’ve been working with many of you to ensure you can maximize the identity analytics in the Oort platform. In this week’s release, a new “Advanced” mode will be made available...

Building a user inventory is often the most challenging aspect of an identity security program, but it is also fundamental to its success. Building an inventory is critical for any area of...

We’re back! The big announcement this week is a major uplift to the Networks section of the User 360 profile, which will make investigations even easier. Read on to learn more!

Last week, we wrote a blog on the takedown of Genesis Market and the implications for session hijacking going forward. In this blog, we’ll explore session hijacking in more depth and provide...

Are you struggling to respond to identity threats in your organization quickly and effectively? Do you want to be able to remediate compromised accounts with just one click? If so, read on!

New Features Include User Quarantine, Log Out, and MFA Reset to Improve Response Speeds and Security Posture

Today I am delighted to announce that Oort is officially a member of the Microsoft Intelligent Security Association (MISA). Oort was nominated by the Microsoft team as a new member for their new...

Oort nominated to the Microsoft Intelligent Security Association, an ecosystem of ISVs and MSSPS focused on combatting increasing global cybersecurity threats.

Summary

Yesterday, the FBI seized Genesis Market, an Automated Vending Cart (AVC) that sold the cookie data of consumers and corporate accounts. In doing so, Genesis enabled criminals to bypass...

Summary

In case you haven’t noticed, we’re big into remediation at the moment. On the back of a flurry of new action options, we’re now introducing new features to make it easy to operationalize our...

Identity Security Posture Management (ISPM) is an essential aspect of an identity security program that enables organizations to manage and protect their identities proactively. It involves...

Identity has become the last best line of defense and phishing is back on the rise. We can attribute identity-based attacks to at least 80% of the most recent notable attacks. The idea behind all of...

Summary

While some of our team were at Gartner IAM and SecureWorld Boston last week, the Oort Identity Security Platform continued to grow! This week, you’ll benefit from new dashboard updates, extra...

Summary

Oort’s Engineering Team was on 🔥last week. This week, you can benefit from our new dashboard and the ‘Quarantine User’ action type. We’re also introducing the Oort Knowledge Base this week....

Today, we’ve officially unveiled our new dashboard, now available to all existing customers. The dashboard has been much sought after across our customer base, so I’m excited to see this become...

The new dashboard helps security and IAM teams to overcome data silos, track their identity population, and identify emerging trends.

Summary

This week we’ve introduced new ways to access users’ latest login information and changes to our detection of suspicious browser log-ins. 

Security teams are struggling to combat increasing identity threats effectively. Why? Because they’re using yesterday’s technology stack to solve today’s problems. 

Summary

Oort’s new remediation features have gone down a storm with users–so we’re releasing even more! Continue reading to find out about our latest action option and what else we’ve made available...

The Gartner Identity & Access Management Summit in Grapevine is now less than 20 days away. More than 1,000 IAM and security leaders will come together for three days to share experiences and learn...

Summary

As we approach the end of February, our engineering team continues to deliver the goods. This week we’re introducing a new check and additional data types for collection. 

In case you missed it, Oort released the inaugural 2023 State of Identity Security report. If you don’t want to download a copy, you can read all about the report's key findings in another blog we...

Investigative report from Oort analyzed user data, login information, and behavioral intelligence from more than 500,000 identities

Summary

Last week we introduced the first of our “Actions.” This week, we’ve released additional capabilities by enabling MFA resets from within Oort.Over the past week, we’ve also introduced new...

When I talk to our customers, one thing they love most about Oort is how closely we tie into their existing technologies. They can integrate their current technologies into Oort and integrate Oort...

Summary

New insights, more context, and new remediation options. Brighten up your Monday morning by reading about Oort’s new capabilities. I’m passionate about the “response” piece of Identity Threat...

Our CEO, Matt Caulfield, recently sat down with Eric Richard, CISO at HubSpot. Eric spoke about his challenges, career path to becoming a CISO, why water balloons are like security, and advice for...

Summary

There’s a lot of good stuff this week! We have a brand new page called System Logs – read on to find out what’s in there, why we’ve released it, and what you can expect to use it for. Second,...

If you’re reading this blog, there’s a good chance you’re familiar with Salesforce. It’s a hugely popular platform that businesses use to manage their customer data, sales activities, and other key...

Most enterprises now have some form of multi factor authentication (MFA) to better protect employee accounts. However, not all MFA are created equal. While some forms of MFA are incredibly strong...

Summary

This week’s release brings several new features, including improvements to the Unused User Application check. The team is busy working on some incredibly exciting new capabilities which we...

Summary

This week, we’re excited to add a new integration for Salesforce. Managing the disconnect between users in Salesforce and other identity platforms can be a real security headache, which I’ll...

Okta is a popular identity provider that makes it easy for IT teams to deploy Single Sign-On (SSO) and implement MFA, while speeding up the provisioning of applications and access policies.

Cybersecurity start-up welcomes Chief Marketing Officer Anna (Jensen) Tutt, VP of Revenue Peter Martin, and Director of Product Marketing Michael Marriott 

Last week our Founder & CEO, Matt Caulfied, wrote a great piece on why he started Oort and what he hopes to achieve. When I first talked to Matt, I had a lot of the same questions about the company;...

Summary

Oort’s User Detail pages provide you with information about each user, which Oort pulls in from all of your linked identity providers. Having all of this information in one place is helpful...

Since February 2022, when we first launched the Oort Identity Security Platform, Oort has grown to secure more than half a million accounts.

Summary

While many of us have spent the last few weeks plowing through chocolate and knocking back eggnog, the untiring Oort engineering team has been busy adding new features and functionality for...

Summary

With Hanukkah now upon us and Christmas fast-approaching, Oort’s engineering team has delivered a selection of gifts for you to enjoy. Read on to find out about how Oort identifies unused...

Summary

Another week; another feast of new Oort capabilities. This week, we have new insights available via the HRIS Discrepancy check, deeper context in existing checks, and a host of new ways to...

Summary

Another week brings another impressive set of new Oort functionality. The headliner this week is a new check that will help customers who run into challenges keeping consistency across both...

Summary

For obvious reasons, protecting against threat actors gaining admin access is often a top priority for our customers. In this week’s update, Oort Engineering has added a host of enhancements...

Background information on Okta

Okta Inc is an identity and access management company, which is publicly traded and based in San Francisco. It offers cloud software that helps businesses to secure and...

Named a top trend in cyber security for 2022 by Gartner, identity threat detection is an area of security all businesses need to give considerable thought to this year.

We live in a day and...

What is Azure Active Directory (AAD)?

Azure Active Directory (Azure AD or AAD) is Microsoft’s cloud-based directory and identity management service. It is a comprehensive solution that provides a set...

Summary

Thanksgiving may have shortened last week for some, but there was no shortage of new capabilities added to the Oort platform.In this week’s update, Oort Engineering has enhanced our robust...

Identity Threat Detection and Response (ITDR) is a hot topic in 2022, with Gartner having published multiple pieces of research on the subject (seeTop Trends in Cybersecurity 2022andEnhance Your...

🔢 Context Menu for IP Addresses

Have you ever noticed an IP address and thought to yourself: “where have seen that before?” Well, Oort can now answer that question for you with a couple of clicks....

Summary / Table of content

This week, a lot of improvements to make your job a bit easier, and keep your users safer.

New features

Microsoft Entra Risky user alert in User360 Overview

Azure AD monitors and alerts on a certain number of suspicious behaviors. That data can provide more context and identify risky users.

Enterprise Security Startup Oort Raises $15M in Series A Funding to Stop Identity-Based Cyber Attacks

Investment will power identity-centric security platform's go-to-market strategy and leadership...

Identity Threat Detection & Response for Enterprise Security

Ace the audit with low-lift access reviews.

Make access reviews a part of normal business operations instead of an...

Empower your enterprise IAM team with instant identity security and analytics.

See your whole identity program in one place.

Connect your identity provider(s) and human...

New features

New check: Admin role assigned to user in Okta

The admin role in Okta comes with great power (and responsibility), so it is best to monitor whenever a user is getting admin privileges,...

New features

New Check: Admin Impersonation in Okta

Okta offers the ability for admins to impersonate any user in their account (and benefit from the permissions of that user in the environment).

Preface

On August 7th this year an attack called #oktapus started to get uncovered by Group-IB. The attack was targeting Okta customers, but how does the sentence “9,931 accounts at more than 130...

Oort enthusiasts,

This week we have been hard at work making investigations faster and more accurate in Oort, and improving usability over the whole portal:

It’s been a busy week in the world of identity with some sobering developments impacting organizations using Okta. The so-called “0ktapus” campaign is out there stealing credentials and weak one-time...

Phew! We just got back from the Gartner IAM Summit in Las Vegas. It was great to connect with current customers, demo Oort to new partners, and learn all about the trends that are shaping the future...

We have a lot of new and useful features to announce this week, but first some news. We’ll be at the Gartner IAM Summit in Las Vegas next week where we expect to be blown away by all of the...

It’s a great week here at Oort! As you know, we’re on a mission to help security and IT teams take control of their identity security, and a big part of that is how we collect data to calculate...

We have some more great product updates this week, including **THREE** all-new Identity Security Checks. If you’re an Okta customer, you’ll find these especially valuable in keeping your Okta...

It’s been another busy week for us with some of our team at CSA Western Michigan’s CloudCon conference and others at AWS re:Inforce in Boston.

Identity security remains a hot topic and our recent trip to Identiverse in Denver, CO, proved that there are many brilliant minds out there focused on solving the issue. We learned a lot, met with a...

We’ve just gotten back from a whirlwind trip to the RSA Conference in San Francisco where we met up with partners, customers, prospects, and friends. If you’re following our LinkedIn (if not, you...

Nicolas Dard, Oort’s VP of Product Management, took the time to share with us a little bit about his position with Oort and how he got involved in the cyber security world. With almost 15 years of...

The numbers are stunning: over 60% of data breaches are the result of credential abuse. Another way of saying this is that by focusing on identity security, you can reduce your likelihood of a breach...

Identity and access management has grown to encompass a number of key responsibilities inside today’s enterprise. From account provisioning to access requests and group memberships, IAM teams have...

We sat down with Oort’s Data Science Lead, Alex Zaslavsky, and got the scoop on how data powers decisions in identity threat detection and response, and how the best identity security companies...

Oort’s Head of Solutions Engineering, Andy Winiarski, takes you on a quick video tour of Oort’s exclusive Identity Security Checks.

So much to share this week! Multiple major product updates and, not to mention, the incredible success of Identity Threat Detection & Response (ITDR) as the hot new trend in Cybersecurity for 2022....

The lines between information technology and cybersecurity have never been blurrier and that’s causing enterprise organizations to rethink how they approach digital risk management and threat...

We sit down with Oort’s Head of Solutions Engineering, Andy Winiarski, for a conversation about the trends and opportunities he sees in identity threat detection and response. Read on for some...

We are delighted to announce that the Oort platform has emerged from beta and is now generally available! Our team has been hard at work listening to and working with our beta customers and design...

Security professionals often hear about SOC 2 compliance as a standard to which technology companies should be held. This is especially true in recent years with companies experiencing an ever...

Didi Dotan recently joined the Oort team as its first VP of Engineering. Things move fast here at Oort, and before we got too far along I wanted to hear more about Didi’s background and why he wanted...

Denzil Wessels is the Chief Product Officer at Oort. He brings decades of industry experience to the team from multi-billion-dollar market-cap network security companies including Juniper, Aruba and...

A Conversation With Oort’s Founder & CEO

In an effort to introduce you to the people building Oort, I sat down last week with Oort’s Founder & CEO, Matt Caulfield, to discuss his motivation for starting the company and where he sees...

High-profile security breaches, such as Target and Wipro, underscore the importance of properly securing vendor access. Yet today’s vendor access processes can be unwieldy, costly, and often...