Identity remains the most targeted attack surface in modern environments—and Okta is often at the center of it. With BitLyft AIR® version 1.20, we’re significantly expanding Okta-focused detection and response capabilities to help security teams identify identity threats earlier and respond faster with less manual effort.
This release introduces 13 new Okta security detections, a purpose-built compromised account playbook, and new out-of-the-box automation mappings designed to reduce mean time to respond (MTTR) for identity-driven incidents.
BitLyft AIR® v1.20 adds 13 high-value Okta detections to BitLyft Essential, focused on the most common identity-related breach patterns: credential abuse, privilege escalation, misconfiguration, and post-termination risk.
These detections help surface early indicators of compromised credentials and brute-force activity:
Visibility into admin behavior and privilege changes is critical in Okta environments:
Misconfiguration remains a leading cause of identity breaches:
Together, these detections help identify both external threats and insider or misuse scenarios that traditional alerting often misses.
New Compromised Okta Account Automation
Version 1.20 introduces a new Compromised Okta Account automation, designed specifically to respond to identity-based incidents detected in Okta.
What this enables:
The playbook pairs directly with the new Okta detections, enabling detect → decide → respond workflows out of the box.
To further accelerate response, this release includes two new OTTB automation mappings that connect Okta detections directly to remediation actions.
Why this matters:
BitLyft AIR® v1.20 strengthens identity security by:
For teams using Okta as a primary identity provider, this release helps close critical gaps between detection and response without adding operational overhead.
To see how BitLyft AIR® automates identity threat detection and response across Okta and beyond, check out BitLyft AIR®.
(