The news recently broke: Okta was breached earlier this year and it potentially affected several hundred of their corporate customers. Though Okta is one of our competitors in the Identity and Access…
What is application onboarding? It is the deployment of software and the granting of user access with the proper permissions and roles defined. More importantly, it is putting that application under the…
The main difference between Zero Trust and defense-in-depth security strategies is that Zero Trust never implicitly trusts users inside or outside network perimeters.
Co-authored by Alan Radford from One Identity and Stuart Sharp from OneLogin
Organizations are under constant pressure to boost productivity and cut costs. To handle repetitive, mundane and time-consuming…
A year ago we launched our cloud service, Safeguard On Demand, which automates, controls and secures the management of privileged credentials, session audit, and privileged behavior analytics. The result…
On January 26, the U.S. White House Office of Management and Budget (OMB) issued a memorandum on advancing security measures to dramatically reduce the risk of successful cyberattacks against the federal…