Cloud-based IAM solution
February 2016, News, Cyber Security
OneLogin is launching a new set of capabilities addressing the needs of enterprises with hybrid on-premise and cloud-based IT environments. In addition to new RADIUS and LDAP interfaces, OneLogin has also acquired San Diego-based Cafésoft, a provider of on-premise Web Access Management (WAM) software.
OneLogin’s cloud-based identity and access management (IAM) solution has been deployed by thousands of organisations ranging from fast-growing tech unicorns to multinational enterprises. The consistent feedback from larger enterprises with more complex IT environments has been that they would prefer IAM vendors who are able to handle both their cloud-based applications and their on-premise applications.
The new LDAP service allows enterprises to connect to OneLogin’s cloud directory via the LDAP protocol, which expands OneLogin’s coverage of applications beyond those that support federation through SAML and WS-Trust.
The new RADIUS service supports the full RADIUS protocol and strong authentication methods, such as EAP-TLS. Enterprises can use this capability within corporate network devices, such as VPNs and Wi-Fi access points.
In addition to these new interfaces, OneLogin has completed the acquisition of Cafésoft, a provider of Web Access Management (WAM) software with customers such as NASA and TiVo. The company’s WAM solution provides the security middleware to easily integrate identity into heterogeneous web environments.
The technology allows OneLogin to provide a more comprehensive identity solution for hybrid environments, including simplified on-premise WAM and a complete replacement for CA Single Sign-On (formerly CA SiteMinder), Oracle Access Manager and others.
“Our goal is to manage all identities that touch corporate data, whether it be in the cloud or behind the firewall,” said Thomas Pedersen, CEO of OneLogin. “These new authentication interfaces combined with Cafésoft’s Web Access Management technology allow us to reach even deeper into the enterprise and provide a new level of speed and integrity to our customers’ businesses.”
- From the editor's desk: Open season on IP surveillance
April 2017, Technews Publishing, News
Who would have guessed that IP surveillance equipment would become such a player in the cybersecurity world? Never mind the Mirai botnet that made use of some sloppy coding from a Chinese manufacturer ...
- Securing your security
April 2017, Technews Publishing, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure
The digital age has not only seen the security industry migrate to IP, but is now forcing it to be aware of the latest cyber security risks.
- Wireless works for CCTV
April 2017, MiRO Distribution, RADWIN, CCTV, Surveillance & Remote Monitoring, Cyber Security
Wireless networking is a reasonable choice for surveillance, as long as one uses the right technology and plans correctly.
- Be prepared for these three cyber threats
April 2017, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
A person or organisation with malicious intent can harm or sabotage a VMS system in several ways. This means that people or assets could be at risk.
- Cybersecurity: an electronic security distributor’s view
April 2017, Tyco Security Products, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
Over 79% of South African internet users who have lost money at the hands of cyber criminals have only got some, or none, of their stolen funds back.
- Weaponised IoT attacks: what does the future hold?
April 2017, This Week's Editor's Pick, Cyber Security
The first Mirai attack was a portend of the new, dark era in cybercrime and the physical security industry is right in the middle.
- 2-for-1 deal
April 2017, Technews Publishing, News
Not only are you getting the April 2017 issue of Hi-Tech Security Solutions delivered to your doorstep, but this month we are sending you the CCTV Handbook 2017 as well. How lucky can you be, you get ...
- The cloud and security
April 2017, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Cyber Security
Security and the cloud are well suited to each other if the solution is set up and managed effectively.
- It’s still your data
April 2017, This Week's Editor's Pick, Cyber Security, IT infrastructure, Security Services & Risk Management
The cloud can be secure, or not. Choose your provider and check your contract carefully. In the end, your data is your baby.
- Setting your security posture
April 2017, Cyber Security, IT infrastructure
Hi-Tech Security Solutions finds out what a security posture is and how to determine yours.
- TSCM in the 21st century
April 2017, Security Services & Risk Management, Cyber Security
“Both cyber and physical security are necessary, but there is an area in between that neither one extends into. That is where TSCM sweeps are needed”.
- Cloud security: five considerations
April 2017, IT infrastructure, Cyber Security
Forewarned, as they say, is forearmed.