Onion ID at Gartner Identity & Access Management Summit

Meet Onion ID at the Gartner Identity & Access Management Summit in Las Vegas

Onion ID will be at the Gartner Identity & Access Management Summit in Las Vegas from 29 November - 1 December 2016! As one of the premier security conferences, you’ll learn how to tackle complex issues and generate new ideas to reimagine significant elements of your IAM approach for digital age success. Hear the latest tactics and best practices across IAM fundamentals, and take a look ahead at analytics-driven automation and advances in consumer engagement platforms, so you can [...]

Identity Theft

Identity Theft – Is Your Business Vulnerable?

Identity theft is a hugely personal crime, targeting individuals, taking their personal information, and then using it for gain. But it isn’t just individuals who are being affected: there is a serious and rising risk to businesses. Successfully targeting a business is often no harder than targeting an individual, but the rewards that come with a successful ID theft can be far greater. Criminals frequently target businesses for several key reasons: Businesses have more money in their bank accounts. When opening a [...]

Onion ID – Our story, goals and vision

We started Onion ID in early 2015, a little more than a year ago. I had the pleasure of working with some of the most technically astute people that acquired my last company, StopTheHacker, a couple of years back. It was a really wonderful experience. It was time to follow up on a burning itch to solve a problem that I had seen come up again and again and had heard about from many peers – privilege management. Why Privilege [...]

Privilege Management for Healthcare Compliance and Security Teams

Enterprises, and small businesses work on trust. Trust between the business and the customer and trust internally inside the organization. In order to reinforce trust and make sure no violations occur, or at least we know when violations occur to take action – it is important for enterprises to manage the privileges that it affords to employees and contractors when handling customer data and business critical systems. An example of Privilege Management A typical example of Privilege Account Management (PAM) as [...]

2 Factor Authentication

2 Factor Authentication – A Primer

As people and companies become increasingly aware of the security risks involved in having many log-ins for many applications, methods of stronger security have been introduced over the years. Two-factor authentication isn’t necessarily new, but it has steadily improved and utilized new techniques that have made it a favorite security measure of many companies and end-users. What is 2 Factor Authentication? 2 Factor Authentication is a security method that utilizes two factor classes to make it exceedingly difficult for hackers to [...]

The Agony of Provisioning Users on Cloud-Based Services

The Agony of Provisioning Users on Cloud-Based Services

The Agony of Provisioning Users on Cloud-Based Services In this article, we are going to take a look at the frustrations that businesses may face when provisioning users to cloud-based applications that they use. We will examine the most common difficulties, and how Onion ID can help you to overcome them. Dashboards are often confusing Millions of business users and Internet users experience frustration with online dashboards on a daily basis. Dashboards are often confusing, add to that the hassle of maintaining [...]

5 Trends Driving Identity and Access Management

Five Trends That Are Driving The Need For Identity and Access Management

Fifteen years ago, Identity and Access Management (IAM) was relatively simple; employees would work on the premises using a desktop PC that had been set up and configured by the IT department. Only those who had a login could gain access, and if you weren’t on the premises it was a lot harder to gain access to valuable corporate resources. Fast-forward to today and security breaches of corporate IT networks are rarely out of the news. So far in 2015 [...]