7 Facts That Show Why PAM is the Next Hot Technology to Prevent Insider Threats

7 Facts That Show Why PAM is the Next Hot Technology to Prevent Insider Threats

When people think of issues relating to compromised information or a data leak, the image that usually comes to mind is that of the mysterious hacker that could be anywhere in the world. While this is an important concern to maintain, this focus tends to be at the cost of considering the threat that could be right under your nose. In this article, we are going to talk about the threat of an insider attack. Security failures that come from [...]

The Biggest Privileged Account Management (PAM) Challenges that Organizations Face

The Biggest Privileged Account Management (PAM) Challenges that Organizations Face

Privileged account management is a key part of an organizations overall security. These accounts need to access sensitive data and systems, which means that they present significant vulnerabilities that insider threats or outside attackers can take advantage of. There are many challenges involved in managing privileged accounts, simply because there is so much more at stake than regular user accounts. There is a complex balance between security and ease of access, with organizations needing to implement adequate infrastructure and a [...]

Effective Strategies to Stop Privilege Creep for Employee Accounts

Effective Strategies to Stop Privilege Creep for Employee Accounts

The vast majority of us have worked in organizations where employee churn, unaccounted for privileges, bloated access rights etc. have been a very real thing that IT and Ops has to deal with. In the case of employees being added to a fast moving Silicon Valley based Unicorn or a slower moving, but massive Fortune 500 enterprise, privilege creep is a very real issue. In this article we will discuss what is privilege creep, why it manifests itself and [...]

Is Your IT Security a Roadblock For Your Employees?

Is Your IT Security a Roadblock For Your Employees?

Many employees feel like they are facing roadblocks in their workplace; barriers created by the increasingly stringent security methods required to protect today’s organizations from a wide range of digital threats. And what happens when we meet a roadblock? We try to go around it - we seek an alternative route, a quicker and more effective way to reach our destination. This is the challenge that many organizations face today: that the same barriers we rely on to protect our organizations [...]

25 Must-Read Blogs for CIO’s

CIO stands for many different things. The “I” can stand for Information, Innovation, Integration, Infrastructure, and the title differs from one company to another. Much like the title, the responsibilities vary widely, but they are always several and weighty. The position requires skills and knowledge from different fields, as the CIO sets the technological direction of the company, manages IT projects, supervises team, etc. Blogs written by peers and experts in related fields are a great source of inspiration and [...]

Who changed the router settings? Easy Accountability for Shared Access!

Who changed the router settings? Easy Accountability for Shared Access!

Who changed the settings on the router? Who changed the password on the SFDC account? Who changed language settings on the service? Who... who.. who... a never ending stream of important questions. The move to the cloud Why do these questions come up in enterprises? After all aren't we using sophisticated account management practices, tied in to Active Directory and more. The answer lies buried beneath the surface of modern day SaaS applications, although what we are discussing here is hardly [...]

Securing Access to your Cloud Apps

Securing Access to your Cloud Apps

Securing Access to your Cloud Apps should be simple. For pure efficiency SaaS seems to be the universal answer.  It eliminates the expense of power, maintenance, environmental controls, maintaining parallel backup sites, and a massive IT staff. BYOD (Bring Your Own Device) strategies have led to disruptive incompatibilities when people are creating files.  A Mac™ user has difficulty sharing documents and files with a Windows™ or BlackBerry™ user, and vice versa.  Access to company data by tablet or phone [...]

Protect your Servers, Applications, Admins & Employees in 60sec

Protect your Servers, Applications, Admins & Employees in 60sec

In just 90sec, we illustrate how Onion ID can help you secure your infrastructure and effectively manage employee access and privileges within your firm. Visit our YouTube channel for more videos around infrastructure access and employee privilege management today! You can also find the full video transcript below. Meet Bruce, an IT manager at Acme Financial Corp. With Onion ID he has full access to the company’s apps and full control over what his employees can see, click, fill out and modify on each [...]