Overview
This package is designed to address challenges such as “an increase in unauthorized access,” “the growing impact of identity breaches,” and “a lack of visibility into endpoints and users”—issues that have become increasingly difficult to manage with traditional perimeter-based security as cloud adoption and remote work expand. By combining EDR and workload security products that detect and defend against threats in endpoint and cloud environments, identity management (IAM) products that enable user authentication and access control, and cloud-based network security products that control and inspect network traffic, we provide consistent security across users, devices, and applications. The integrated deployment of these solutions enables centralized management of security policies and real-time risk assessment, simultaneously reducing operational burdens and enhancing security levels. As a result, we expect to build a secure access environment independent of location or network, and to realize a flexible and sustainable IT infrastructure designed for cloud utilization.
Use cases
Identity Management and Access Control
Okta serves as the identity platform, handling user authentication, multi-factor authentication, and conditional access to control who can access which apps on which devices.
By integrating with CrowdStrike’s device health data (device risk), it ensures that access is granted only to secure identities on secure devices.
Network Security
Zscaler acts as a cloud-based secure gateway to route traffic and control access on a per-application basis.
By not trusting the network, it provides least-privilege access on a per-user and per-application basis, based on Okta authentication results and CrowdStrike endpoint status.
Endpoint Detection and Response (EDR)
CrowdStrike continuously monitors endpoint activity to detect and contain malware and suspicious behavior in real time.
When a risk is detected, it integrates with Okta and Zscaler to enable an automated response that immediately restricts authentication and blocks network traffic.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Products included



Features and programs
Financing for AWS Marketplace purchases
Pricing
Custom pricing options
Integration guide
This solution combines CrowdStrike, Okta, and Zscaler to deliver an integrated security architecture based on the Zero Trust framework. CrowdStrike handles threat detection and prevention (EDR/EPP) for endpoints and cloud workloads, continuously assessing the health of devices and running processes. Okta handles identity and access management (IAM), strictly controlling “who is accessing the system” through user authentication, single sign-on, and multi-factor authentication. As a cloud-based network and security service, Zscaler routes and inspects traffic from users and devices, controlling “where and how connections are made.” These products integrate authentication and authorization information from Okta, device posture (device risk status) provided by CrowdStrike, and Zscaler’s policy engine to comprehensively evaluate the context of users, devices, and applications. As a result, we build an architecture that provides secure access and advanced threat protection for both cloud and on-premises environments, independent of network boundaries.