Webinar – Turbocharging Okta for Privileged Access Management

Onion ID is a state of the art PAM solution that ties into your Okta installation. No need to recreate user groups and application profiles. Simply enable the Onion ID-Okta integration and you can deliver a 1-2 punch to insider and outsider threats.  Okta first opens the door to various applications for your employees via its SSO mechanism. Onion ID steps in after this initial step and helps you get complete control of what an employee can see, do, [...]

Onion ID brings Privileged Access Management (PAM) to WorldHostingDays.global 2016

This year Onion ID will be at WHD.global 2016 to be held in Europa Park, Germany on March 15-17. WHD is a world-class technology conference that brings together leading experts from the hosting and cloud services industry. For businesses in this highly competitive industry, consumer trust is critical: if customers do not feel that their information is secure, they will simply move to a different provider. A simple search of mainstream media outlets is enough to reveal highly-publicized incidents in [...]

Webinar - How To Identify, Track & Reclaim SaaS License Costs

Webinar – How To Identify, Track And Reclaim SaaS License Costs

In this webinar, Anirban Banerjee, Founder and CEO of Onion ID, covers the process of tracking and reclaiming license costs associated with cloud services. Despite their established benefits, cloud services are also associated with hidden but significant costs that are often overlooked by businesses. Thankfully, by tracking SaaS license usage and implementing an efficient strategy for Privilege Access Management (PAM), you can take control of your costs and get the maximum efficiency out of your budget. When you are paying, [...]

Webinar – Behavior Based Authentication to Protect IT Assets

Webinar – Behavior Based Authentication to Protect IT Assets

Securing IT infrastructure is a critical task that comes with multiple challenges. This task becomes even harder due to the ever-expanding landscape of threats. In our webinar, we highlighted these challenges and threats, and identified important problems with the status quo in IT Security. We then discussed how an Active Authentication approach can rise to the challenge and deliver an end-to-end solution that addresses these problems. Did you miss our Webinar? You can catch up everything in here. (more…)