Onion ID to present at HostingCon 2016 the latest Privileged Access Management.

Onion ID, one of the most promising startups in the field of Privileged Access Management, will be presenting at this year's HostingCon Global at the Morial Convention Center in New Orleans, LA. The conference will be held July 24-27 with the aim to serve the professional interests of the Hosting and Cloud Community. As a company at the forefront of Privileged Access Management, Onion ID provides an end-to-end solution that allows businesses to prevent insider threats, secure servers and 3rd [...]

PAM

Demystifying Acronyms for PAM

PAM stands for Privileged Access Management (Access is often interchanged with Account). The area is also identified as PUM or PIM (User or Identity). There are various acronyms that have been published over the years by various research firms like Gartner and in this article we will go about explaining what they all mean. I would strongly suggest reading Gartner's Market Guide for Privileged Access Management for 2015 by Felix and Anmol. Its a very well written, researched and [...]

Easily Complying with CIS/CSC 20 controls

Welcome to a brave new world where governments have started to recognize the significant work being done by security groups to shore up our defenses against malware, data compromise and account misuse. A prime example of this is the California Attorney General's statement which puts emphasis on making sure that businesses understand it’s not going to be business as usual anymore. In this article we will talk about what CIS 20 controls stands for and the highlights of the Attorney [...]

Stopping Insider Threats Easily with PAM

Stopping Insider Threats Easily with PAM

This past year has seen an increase in the number of insider threats that cause critical data leakage for large corporations. A recent Intel study showed that insider threats accounted for 43% of data breaches. Many security professionals monitor perimeter firewalls and beef up security where they are considered weak. However, what they often tend to miss are the insider threats that are increasingly problematic in today’s organization.   But You Need to Trust Your Employees, Right? Small businesses run into a [...]