OneLogin launches unified access management IDaaS for on-premise and cloud applications

Unified access management company OneLogin has announced the launch of Identity-as-a-Service (IDaaS) product OneLogin Access, which allows companies to access on-premise and cloud-based applications with a single solution.

Unified access management is a new access management category, the company says, with a $20 billion market growing at a 15 percent CAGR.

“Never has it been more critical — or more complex — to securely manage access across the explosion of distributed applications, data, and intelligence,” said OneLogin CEO Brad Brooks. “Our Unified Access Management Platform featuring OneLogin Access is purpose-built for hybrid customer environments. Historically, a customer’s only option was building a cumbersome, multi-vendor, prohibitively expensive solution. That all changes today.”

One Login cites a January 2018 survey by McKinsey & Company in which 60 percent of respondents said that their enterprise will rely on a third-party access service that unifies access control for on-premise and multiple public cloud environments. A survey conducted in February by Arlington Research for OneLogin showed 98 percent of IT decision makers are interested in a cloud-based solution to unify access management.

“It’s becoming clear for many organizations that hybrid IT is more than a temporary transitional phase, it’s actually an end state,” said Garrett Bekker, Principal Security Analyst, 451 Research. “To manage this hybrid reality, IT professionals must seek solutions to manage application access across both legacy on-prem and cloud environments to be truly effective.”

OneLogin Access provides identity integrations with standard protocols such as SAML to allow legacy applications to be secured with a variety of authentication factors, strengthened with adaptive authentication, and monitored with security information and event management (SIEM), according to the announcement. It integrates with Active Directory in real-time to avoid onboarding and offboarding delays and protect customer and employee data, and features a Docker-based deployment model.

Related Posts

Article Topics

 |   | 

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read This Week

Featured Company

Biometrics Research

Biometrics White Papers

Biometrics Events

Explaining Biometrics