News, news analysis, and commentary on the latest trends in cybersecurity technology.
The combination of One Identity and OneLogin will provide customers with a unified identity security platform to manage identities and networks.
One Identity, a company providing unified identity security solutions, acquired San Francisco-based identity access management provider OneLogin to provide customers with a consolidated platform for managing networks and securing user identities.
One Identity provides identity-focused security products that range from privileged access management (PAM) to endpoint privilege management (EPM), identity governance and administration (IGA), log management, active directory management and security (ADMS). The company plans to integrate OneLogin’s product portfolio, which spans single sign-on, multi-factor authentication, and user provisioning, into its products to help enterprises deliver consistent access policies, manage privileged and non-privileged accounts, and secure user and machine identities across cloud, on-prem, and hybrid environments.
With enterprises shifting more of their applications and workloads to use cloud infrastructure and maintaining a hybrid workforce of employees working remotely and on-premises, the need to protect and manage online identity is critical. Attackers are increasingly targeting identity and authentication to break into applications and systems. Verizon’s 2021 Data Breach Investigations Report found that 70% of breaches are linked to privileged account abuse and 61% involve improper management of credentials.
"By adding OneLogin to our portfolio, and incorporating it into our cloud-first Unified Identity Security Platform, we can help customers holistically correlate all identities, verify everything before granting access to critical assets and provide real-time visibility into suspicious login activity," Bhagwat Swaroop, president and general manager of One Identity, said in a statement. "With identity at the core, customers can now implement an adaptive zero trust strategy and dramatically improve their overall cybersecurity posture."
The deal closed Oct. 1, but the financial terms of the acquisition was not disclosed. More details about the acquisition can be found here.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024