SOFTWARE SECURITY

One Identity Announces Innovations to Security Platform

One Identity | June 06, 2022

One Identity
Following the purchase of One Login last year, One Identity, a pioneer in unified identity security, today announced additional advancements to its Unified Identity Security Platform. In addition to One Identity's best-in-class offerings in Identity Governance and Administration (IGA), Identity and Access Management (IAM), Privileged Access Management (PAM), and Active Directory Management and Security (ADMS), the incorporation of OneLogin to the platform allows organizations to transition from a factionalized to a holistic approach to identity security.

The inclusion of Safeguard Alchemy, a seamless on-boarding for PAM through One Identity's Starling platform, as well as device-level MFA, which offers the capability of secure MFA login access to devices, to the Unified Identity Security Platform. These new capabilities complement the platform's comprehensive analytics, as does a new passwordless auto-login function in One Identity's Safeguard product. Organizations can enable Zero Trust enforcement of access rights by ensuring the proper access permissions are provided throughout the company using a new entitlement right-sizing function.

“The acquisition of OneLogin last year was a critical step for us to be able to deliver a complete and unified security strategy to our customers. Traditional identity and access management tools manage environments in a disjointed manner, leading to identity sprawl — a fragmented and inefficient approach to identity security. One Identity is transforming the way its customers are able to manage and protect access to their most valuable assets — people, identities and data — with a now complete powerful suite of identity security solutions that help simplify access management, reduce IT costs, improve security, and enhance user experience.”

Bhagwat Swaroop, President and General Manager at One Identity

Customers can now safeguard Windows workstations with industry-standard multi-factor authentication (MFA), leverage system-level checks to improve cybersecurity, and close security gaps in a distributed workforce and infrastructure by utilizing a combination of two powerful MFA solutions from OneLogin and One Identity. This desktop level multi-factor authentication is one of the core characteristics that distinguishes One Identity from other identity and access management suppliers, allowing enterprises to expedite cloud migration and easily scale, protect, and manage identities.

The integration of OneLogin and One Identity Manager also provides customers with a centralized and mature IAM and IGA on-boarding and full identity lifecycle solution, including SSO and MFA that addresses enterprise provisioning, user self-service, approval workflows, user access attestation, user access termination, time-based access, and compliance reporting.

As security breaches become more common and cybersecurity requirements get more stringent, One Identity assists clients in their transition to a Zero Trust security approach. With the integration of OneLogin into One Identity's Single Identity Security Platform, the firm provides enterprises with an united picture of users, accounts, machine identities, and accounts, transforming businesses from fragmented to unified. This platform uses identity intelligence and analytics to provide cybersecurity professionals with a clear picture of their risk profile and the ability to take remedial steps as required.

Spotlight

Insights for CISO on Their ASM Journey The idea of an attack surface is not new, but how organizations and CISOs need to view their attack surfaces should be updated. Traditionally, IT has looked at an organization's attack surface from the inside out, asking questions like “What are the assets that connect to the wider internet


Other News
ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Cyber Security & Cloud North America – New Line-Up Speakers Announced

TechEx Events Ltd | April 17, 2023

The Cyber Security & Cloud Congress North America (17-18th May) has announced exciting new additions to its line-up of speakers and panellists for the upcoming two-day event in Santa Clara. The event will take place on May 17th and 18th, 2023, and will feature a diverse range of tech industry experts, including CIOs, CTOs, Cyber Security, Cloud Architects, and other key players in the field. Attendees will have a great opportunity to hear from the most talented speakers including: Prasanna P., Digital Transformation Leader – Enterprise Architecture & Enterprise Strategy Leader – Molina Healthcare Shea Lovan, Chief Security Officer – UC Santa Barbara Sachin Vaidya, EVP Chief Information Officer of Heritage – Bank of Commerce Kishore Viswanathan, Senior Technical Program Manager, Cybersecurity and Compliance – Lucid Motors Sameh Emam, Division Risk Manager – Union Bank Kavitha Venkataswamy, Director – Digital Product Security – Capital One Richard Paz, CISM, Cyber Security Engineer – NASA Jet Propulsion Laboratory & many more! In addition to these keynote speakers, the event will also feature several panel discussions covering a wide range of topics, including Zero Trust, Threat Detection & Response, Training, Talent & Culture, Identity & Access Management, Application Security, Data Security and more. Attendees will have the opportunity to network with other industry professionals and gain valuable insights into the latest trends and technologies shaping the cybersecurity and cloud technology landscape. The Cyber & Cloud Congress North America promises to be a knowledge-packed, innovative, and engaging event for all those interested in Cyber Security and Cloud technology, but also the newest technology solutions, products and services that will be showcased during the event. “We are thrilled to have such an outstanding group of speakers joining us for the Cyber & Cloud Expo,” said Lia Richards, Head of Conference. “With their diverse backgrounds and extensive experience, they will bring a wealth of knowledge and insights to our attendees. We look forward to hearing their perspectives on the most pressing issues facing the industry today”. WHAT ELSE TO EXPECT? Over the course of two days at Cyber Security & Cloud Congress North America attendees will have a great number of opportunities to visit exhibition stalls and connect with the representatives of some of the world’s biggest brands including IBM, IDC, Bosh, AWS, Zoho and many more, all implementing the latest in Cyber Security & Cloud technologies within their sectors. Paying attendees will also have a chance to join the networking party event following Day 1 of the conference, where all will be able to connect and network in a more relaxed setting, with free food and drinks provided. This opportunity is open for Gold and Ultimate Pass Holders, Speakers, Press, Sponsors, and Exhibitors. Find out more information here: https://www.cybersecuritycloudexpo.com/northamerica/networking-party/ Early-bird registration offering 25% discount of the full ticket price is open until 17th April, and interested attendees are encouraged to secure their tickets before the offer ends to avoid missing out on this exciting opportunity. Follow this link to discover ticket types and prices: https://www.cybersecuritycloudexpo.com/northamerica/ticket-types-and-prices/. About TechEx Events Ltd The TechEx Event portfolio is an international conference and tech showcasing cutting-edge tech innovation in enterprise. Featuring real-life use cases and in-depth industry insights, the event series delves into the AI, Big Data, Blockchain, Cyber Security, 5G, IoT and Edge Computing ecosystems. Running for over six years, our co-located events strengths lie within our expert community. We bring the heroes responsible for pushing game changing tech and strategy together, to craft relationships and creative solutions. We are the place where networking never stops – The one-stop-shop for enterprise innovators.

Read More

Spotlight

Insights for CISO on Their ASM Journey The idea of an attack surface is not new, but how organizations and CISOs need to view their attack surfaces should be updated. Traditionally, IT has looked at an organization's attack surface from the inside out, asking questions like “What are the assets that connect to the wider internet

Resources