How to Simplify Security for Your AWS and Cloud Servers?

How to Simplify Security for Your AWS and Cloud Servers

If there is one good thing that came out of the recent cyber-attacks, it is the fact that more companies are becoming focused on cyber security. For some of them, such as Target, Sony, LinkedIn, and Verizon, security was an afterthought until they got burnt. Others decided that prevention is better than the cure and that issues caught by their users are more threatening than those caught internally. We all know that cyber-security is a process that takes time, and [...]

Protect your Servers, Applications, Admins & Employees in 60sec

Protect your Servers, Applications, Admins & Employees in 60sec

In just 90sec, we illustrate how Onion ID can help you secure your infrastructure and effectively manage employee access and privileges within your firm. Visit our YouTube channel for more videos around infrastructure access and employee privilege management today! You can also find the full video transcript below. Meet Bruce, an IT manager at Acme Financial Corp. With Onion ID he has full access to the company’s apps and full control over what his employees can see, click, fill out and modify on each [...]

Take Control Back From 3rd Party SaaS Apps Today

Take Control Back From 3rd Party SaaS Apps Today

When a business uses a 3rd party SaaS application, they are entrusting another organization to handle some of their data and processes. There are many advantages to this: businesses receive a high value service at a lower cost to what they would pay for providing the same service internally. Using a 3rd party service also enables your business to save time and money spent developing a solution, enabling you to get started straight away. As more and more businesses use [...]

Webinar – Turbocharging Okta for Privileged Access Management

Onion ID is a state of the art PAM solution that ties into your Okta installation. No need to recreate user groups and application profiles. Simply enable the Onion ID-Okta integration and you can deliver a 1-2 punch to insider and outsider threats.  Okta first opens the door to various applications for your employees via its SSO mechanism. Onion ID steps in after this initial step and helps you get complete control of what an employee can see, do, [...]

Choosing the right bullet: targeted vs broad solutions for security concerns

Tom Seo from Envision Ventures (investors in Onion ID) recently published a high quality enterprise security article on Techcrunch. The article provides a very logical run down of the situation for enterprise security as it stands today. In fact the material can be interpreted as a good thought leadership position paper. Tom has done a great job at grasping a lot of what goes on in the enterprise security space. Tom has been kind enough to recognize any advice [...]

Onion ID – Our story, goals and vision

We started Onion ID in early 2015, a little more than a year ago. I had the pleasure of working with some of the most technically astute people that acquired my last company, StopTheHacker, a couple of years back. It was a really wonderful experience. It was time to follow up on a burning itch to solve a problem that I had seen come up again and again and had heard about from many peers – privilege management. Why Privilege [...]

Webinar – Behavior Based Authentication to Protect IT Assets

Webinar – Behavior Based Authentication to Protect IT Assets

Securing IT infrastructure is a critical task that comes with multiple challenges. This task becomes even harder due to the ever-expanding landscape of threats. In our webinar, we highlighted these challenges and threats, and identified important problems with the status quo in IT Security. We then discussed how an Active Authentication approach can rise to the challenge and deliver an end-to-end solution that addresses these problems. Did you miss our Webinar? You can catch up everything in here. (more…)

Is Your Organization at Risk from Insider Threats?

The stark reality of IT security today is that insider threats, from members of your organization, are just as potent a threat as those from outside. We don't like to consider the fact that our employees may be maliciously using business data for their own ends, but ignoring this fact leaves your business vulnerable. According to recent research[i], 62% of security professionals saw the amount of insider attacks they experience increase over the last year. The average frequency of these [...]