Thycotic Buys Onion ID to Extend PAM Portfolio
The acquisition brings three new products into Thycotic's privileged access management lineup.
Thycotic, a provider of privileged access management (PAM) technology, has confirmed plans to acquire PAM solution provider Onion ID as a means of expanding its product portfolio.
The deal will bring three new tools into the firm's lineup. Thycotic Remote Access Controller is built to simplify and automate access to IT resources for remote employees. Thycotic Cloud Access Controller ensures admins for Internet-as-a-service (IaaS) platforms and software-as-a-service (SaaS) applications can maintain role-based access controls, which state what users can read, click, or modify in a web application.
The third, Thycotic Database Access Controller, will let organizations adopt modern cloud databases while managing appropriate access levels, multifactor authentication, and reporting and auditing, all of which are needed as more businesses adopt cloud-hosted databases.
Onion ID was founded in 2015 and developed a cloud-based SaaS tool to help businesses and teams control access across properties. In a statement on the acquisition, founder and CEO Anirban Banerjee said it strengthens the company's commitment to bringing authentication and auditing to cloud servers, databases, and applications. Onion ID plans to launch a set of next-gen PAM tools to help organizations increase their security controls, Banerjee said.
Terms of the deal were not disclosed. Following the acquisition, Onion ID will operate under the Thycotic brand and leadership.
Read more details here.
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024