Hi [[ session.user.profile.firstName ]]

OneLogin

  • Date
  • Rating
  • Views
  • Why Passwords are the Enemy of the Modern Enterprise
    Why Passwords are the Enemy of the Modern Enterprise
    Thomas Pedersen, CTO & Co-Founder @ OneLogin; Michael Gleason, Senior Product Marketing Manager @ OneLogin Recorded: Jun 11 2019 25 mins
    If passwords are designed to improve security, why are they responsible for 81% of breaches?

    Passwords are reused too often, not rotated often enough, repeated across personal and corporate accounts, stolen in consumer breaches, and used in brute spray attacks against your company.

    Join identity and security veteran Thomas Pedersen, Co-Founder and CTO of OneLogin, for a speedy 25 minute webinar where you will walk away with:

    -Common attack scenarios pulled from the millions of login events OneLogin processes every day
    -Why 23% of all login activity in Office 365 is malicious activity from China - and what to do about it
    -How to eliminate up to 90% or more of the passwords in use at your company in favor of SAML
  • OneLogin Spring ‘19 Release Product Webinar
    OneLogin Spring ‘19 Release Product Webinar
    OneLogin's Product Team Recorded: Jun 5 2019 41 mins
    Come learn about the new features and enhancements included in the OneLogin Spring ‘19 Product Release! In this release, we will highlight key features and functionality on OneLogin’s Authentication services. Join us on June 5th, 10am PT/ 1pm ET, for a live webinar hosted by our product team, who will showcase the following:

    -Strong and simple authentication capabilities with Multi-MFA Configuration, OneLogin Protect, Trusted IdP for OpenID Connect
    -New VLDAP Support with JAMF Pro
    -Early Preview Programs for WebAuthn and Voice Authentication Factor

    Our product managers are looking forward to the opportunity to interact with you. Bring questions, give feedback, and be heard!
  • Securing Access to On-prem and SaaS Environments with Cloud Based IAM
    Securing Access to On-prem and SaaS Environments with Cloud Based IAM
    Merritt Maxim, Senior Forrester Analyst, Forrester Research Recorded: May 14 2019 50 mins
    Despite the rapid enterprise adoption of SaaS, many organizations still rely on a hybrid mix of on-premise and SaaS apps to run their business, creating administrative challenges and inefficiencies.

    Identity-as-a-service (IDaaS) solutions have evolved to provide business and security professionals with a viable and compelling alternative to traditional IAM options. Besides delivering all the great cloud benefits, cloud-based IAM offerings can integrate with on-premise environments to increase business agility, reduce operational inefficiencies, mitigate identity risks, and improve real-time visibility for today's hybrid enterprise.

    Join featured speaker Merritt Maxim, Senior Analyst at Forrester Research, as he discusses the state of IDaaS in the context of new architectures and real world use-cases, including:

    – Current IDaaS Market Trends
    – Critical considerations for building an IDaaS architecture & strategy
    – Challenges in extending on-premises
    – IAM approaches to the cloud
    – Key benefits from deploying IDaaS in hybrid environment
    – Quick Demo of OneLogin IDaaS solution for hybrid environment
  • The 5 Challenges of Hybrid Reality
    The 5 Challenges of Hybrid Reality
    Chris Veith - Director of Strategic Alliances at OneLogin; Kelvin Brewer - CISSP, CEH, Sr SE at Saviynt Recorded: May 7 2019 53 mins
    Mobile, distributed workforces increase the number of access points, devices and platforms needed to achieve IT modernization goals. Commonly recurring challenges facing organizations with hybrid workforce include:
    - Lack of automated controls to protect mission-critical data in the cloud and on-prem
    - Increased compliance mandates requiring tools that match cloud privileged accounts to internal data center resources
    - Lack of continuous monitoring which fails to detect user data and access risks
    - Lack of visibility over the wide range of users and apps including external, internal, vendors and partners
    - Increasing compliance burdens requiring continuous assurance such as SOX,GDPR, CCPA, audits

    These five challenges roll up into a larger one - the cost to create a holistic, comprehensive security solution focused on people.

    Saviynt and OneLogin’s partnership combines our individual expertise to create a unified, coordinated user access and governance solution with fine-grained entitlements that ease identity security burdens facing the hybrid enterprise.

    So, join us for this webinar to learn how to remediate these 5 complex challenges with a simple and unified solution from Saviynt and OneLogin.

    Can’t make it to the webinar? Register anyway, and we’ll send you a link to the on-demand recording once available.
  • Dialing up Your Privileged User Strategy leveraging Single Sign On
    Dialing up Your Privileged User Strategy leveraging Single Sign On
    Dave Shackleford Principal Consultant at Voodoo Security, Shaun Pressley Sr SE @ BeyondTrust; Ben Sherman Sr SE @ OneLogin Recorded: May 2 2019 66 mins
    The list of assets privileged users need to access is ever-expanding in today’s hybrid organizations - infrastructure, internal applications and systems, cloud SaaS apps. These super users are often the main targets for spear-phishing attacks and man-in-the middle hacks, so consolidating and making that access more secure by eliminating passwords and exposed credentials is a critical best practice.

    Alongside privileged admins, a company’s workforce also needs to strike a balance between productivity and security. If IT can’t manage across all user groups, it doesn’t take long before employees start circumventing IT control and Shadow IT and side channels proliferate, multiplying an organization’s cyber risk exponentially.

    Join our cloud security experts Dave Shackleford CEO and Principal Consultant at Voodoo Security, Shaun Pressley Sr SE at BeyondTrust and Ben Sherman Sr SE at OneLogin in this webinar to learn how to build a unified security strategy across all identities. We’ll explore:


    --Privileged access management (PAM), and evaluating your risk potential

    --Single Sign-On (SSO), and understanding your identity management needs

    --Best practices for securing accounts and sessions for privileged and non privileged users

    --How to identify and remediate suspicious behavior in privileged accounts and sessions


    In the world of identity and access management (IAM), integration and alignment of core security controls across privileged and non-privileged users is imperative. Tune in to this webinar to help get on the right track.
  • Enable Secure Cloud Applications with Single Sign-on
    Enable Secure Cloud Applications with Single Sign-on
    Eduardo Helering, Solutions Engineer Team Lead - EMEA, OneLogin Recorded: May 1 2019 49 mins
    Join our Solutions Engineer Team Lead, Eduardo Helering, as he dives into Single Sign-On. In this webinar you'll learn:

    - What SSO is and how it works
    - About SAML is and how powers SSO
    - Why SSO is important
    - How to evaluate your company's risk potential
    - How your company can get started with an SSO solution

    Single Sign-On helps companies be more productive, and save both time and money. Tune in to find out how.
  • OneLogin Accelerate Quarterly Partner Webinar - Spring Edition
    OneLogin Accelerate Quarterly Partner Webinar - Spring Edition
    Matt Hurley - VP of Channels and Alliances at OneLogin Recorded: Apr 25 2019 14 mins
    This webinar is to give our partners quarterly updates about OneLogin Accelerate, partner program including active incentive programs, new sales plays and other program updates.
    Presenter : Matt Hurley - VP of Channels and Alliances at OneLogin
  • How to Enable Secure Access to Cloud Apps with DNS Visibility and Single Sign on
    How to Enable Secure Access to Cloud Apps with DNS Visibility and Single Sign on
    Omar Zarabi - CEO and founder of Port53 Technologies, Nathan Chan - Sr SE at OneLogin Recorded: Apr 24 2019 39 mins
    Companies are moving to the cloud to compete more effectively and employees are using an increasing number of SaaS cloud applications. Unfortunately, these apps come with hidden risks and vulnerabilities when IT is not involved in securing and managing them. This issue is known as Shadow IT.

    The good news is that, as serious as the Shadow IT is, it’s a solvable problem. By joining this webinar, you will learn:
    - Measure the scope and risk of the Shadow IT within your business
    - Gain back full control of your cybersecurity
    - Bring visibility into corporate cloud application usage
    - Get data driven recommendations no matter if your IT team is big or small

    We will be showing a live demo of Cloud Risk Assessment Tool and walk you through a real customer case study.

    So, join our two cloud security experts, Omar Zarabi CEO & Founder of Port53 Technologies, and Nathan Chan Sr SE at OneLogin on April 24th 10am PT for this webinar.

    Can’t make it to the webinar? Register anyway, and we’ll send you a link to the on-demand recording once available.
  • Using Digital Identity as Your Primary Cyber Defense Weapon
    Using Digital Identity as Your Primary Cyber Defense Weapon
    Ehud Amiri, Sr. Director, Product and Michael Gleason, Product Marketing at OneLogin; Shams Mansoor, IT Manager at Evernote Recorded: Apr 4 2019 60 mins
    While compromised credentials cause 81% of data breaches, identity and access management spend represents only 8.5% of security budgets. With recent developments in the digital identity space, IT and security leaders have an opportunity to evolve from the “business enablement vs. security” discussion and consolidate on a new generation of tools to serve both purposes, maximizing the impact of their investments, and reducing their operational workload along the way.

    Join Ehud Amiri, Senior Director of Product Management at OneLogin, and Michael Gleason, Principal Product Marketing Manager, for a webinar where you will walk away with:

    -Vendor-Agnostic Access Management tips everyone can implement

    -Best practices to build your business case and justify your access management asks

    -An understanding of how access management can be the lowest effort, highest impact security project in your business

    -How Unified Access Management technologies can help you extend uniform access management across all users (including FTEs, partners, and customers), devices, and apps (SaaS, on-prem, COTS and custom)
  • Using Digital Identity as Your Primary Cyber Defense Weapon
    Using Digital Identity as Your Primary Cyber Defense Weapon
    Ehud Amiri, Sr. Director, Product and Michael Gleason, Product Marketing at OneLogin; Shams Mansoor, IT Manager at Evernote Recorded: Apr 4 2019 60 mins
    While compromised credentials cause 81% of data breaches, identity and access management spend represents only 8.5% of security budgets. With recent developments in the digital identity space, IT and security leaders have an opportunity to evolve from the “business enablement vs. security” discussion and consolidate on a new generation of tools to serve both purposes, maximizing the impact of their investments, and reducing their operational workload along the way.

    Join Ehud Amiri, Senior Director of Product Management at OneLogin, and Michael Gleason, Principal Product Marketing Manager, for a webinar where you will walk away with:

    -Vendor-Agnostic Access Management tips everyone can implement

    -Best practices to build your business case and justify your access management asks

    -An understanding of how access management can be the lowest effort, highest impact security project in your business

    -How Unified Access Management technologies can help you extend uniform access management across all users (including FTEs, partners, and customers), devices, and apps (SaaS, on-prem, COTS and custom)

Embed in website or blog