Effective Strategies to Stop Privilege Creep for Employee Accounts

Effective Strategies to Stop Privilege Creep for Employee Accounts

The vast majority of us have worked in organizations where employee churn, unaccounted for privileges, bloated access rights etc. have been a very real thing that IT and Ops has to deal with. In the case of employees being added to a fast moving Silicon Valley based Unicorn or a slower moving, but massive Fortune 500 enterprise, privilege creep is a very real issue. In this article we will discuss what is privilege creep, why it manifests itself and [...]

Is Your IT Security a Roadblock For Your Employees?

Is Your IT Security a Roadblock For Your Employees?

Many employees feel like they are facing roadblocks in their workplace; barriers created by the increasingly stringent security methods required to protect today’s organizations from a wide range of digital threats. And what happens when we meet a roadblock? We try to go around it - we seek an alternative route, a quicker and more effective way to reach our destination. This is the challenge that many organizations face today: that the same barriers we rely on to protect our organizations [...]

25 Must-Read Blogs for CIO’s

CIO stands for many different things. The “I” can stand for Information, Innovation, Integration, Infrastructure, and the title differs from one company to another. Much like the title, the responsibilities vary widely, but they are always several and weighty. The position requires skills and knowledge from different fields, as the CIO sets the technological direction of the company, manages IT projects, supervises team, etc. Blogs written by peers and experts in related fields are a great source of inspiration and [...]

Securing Access to your Cloud Apps

Securing Access to your Cloud Apps

Securing Access to your Cloud Apps should be simple. For pure efficiency SaaS seems to be the universal answer.  It eliminates the expense of power, maintenance, environmental controls, maintaining parallel backup sites, and a massive IT staff. BYOD (Bring Your Own Device) strategies have led to disruptive incompatibilities when people are creating files.  A Mac™ user has difficulty sharing documents and files with a Windows™ or BlackBerry™ user, and vice versa.  Access to company data by tablet or phone [...]

Protect your Servers, Applications, Admins & Employees in 60sec

Protect your Servers, Applications, Admins & Employees in 60sec

In just 90sec, we illustrate how Onion ID can help you secure your infrastructure and effectively manage employee access and privileges within your firm. Visit our YouTube channel for more videos around infrastructure access and employee privilege management today! You can also find the full video transcript below. Meet Bruce, an IT manager at Acme Financial Corp. With Onion ID he has full access to the company’s apps and full control over what his employees can see, click, fill out and modify on each [...]

Cloud-Based Management Makes the Difference

Cloud-Based Management Makes the Difference

A majority of the front-end services we interact with on a daily basis utilize cloud-based resources. With such popularity, we must not only gain an understanding as to why this is, but also if we are to consider it for our own implementation. In this blog we delve into the ease of use of cloud-based privileges along with how they work at the enterprise level. Implementation Converting previously internal hosting and IT infrastructure to externally hosted resources is no [...]

Take Control Back From 3rd Party SaaS Apps Today

Take Control Back From 3rd Party SaaS Apps Today

When a business uses a 3rd party SaaS application, they are entrusting another organization to handle some of their data and processes. There are many advantages to this: businesses receive a high value service at a lower cost to what they would pay for providing the same service internally. Using a 3rd party service also enables your business to save time and money spent developing a solution, enabling you to get started straight away. As more and more businesses use [...]

Webinar – Turbocharging Okta for Privileged Access Management

Onion ID is a state of the art PAM solution that ties into your Okta installation. No need to recreate user groups and application profiles. Simply enable the Onion ID-Okta integration and you can deliver a 1-2 punch to insider and outsider threats.  Okta first opens the door to various applications for your employees via its SSO mechanism. Onion ID steps in after this initial step and helps you get complete control of what an employee can see, do, [...]

Why VPN isn't needed anymore in Enterprise security

Why VPNs aren’t needed anymore

The development of Virtual Private Networks (VPNs) was made necessary due to the exponential growth experienced by companies in the time we first saw tunneling protocols emerge. Current iterations of the technology enable organizations to coordinate resources and communications unlike any other internet-based system. By offering an extension to typically in-house networks, businesses were able to expand their private network to multiple geographic locations. Despite once offering the epitome of network security and accessibility, the use of client-based technologies [...]