FB pixel

1Password acquires Trelica to bolster Extended Access Management platform

Categories Access Control  |  Biometrics News  |  Trade Notes
1Password acquires Trelica to bolster Extended Access Management platform
 

Toronto biometric identity security firm 1Password has announced the acquisition of UK SaaS access management company Trelica. A release says the strategic acquisition will “accelerate the delivery of new capabilities in the 1Password Extended Access Management (XAM) platform.”

“Trelica’s technology and approach align perfectly with our mission to unleash employee productivity without compromising security,” says Jeff Shiner, Co-CEO of 1Password. “The acquisition of Trelica accelerates our path to delivering the full potential of our Extended Access Management platform, which ensures that employees’ devices, identities, and apps are trusted before access is granted.”

The complexity of modern digital ecosystems, which mix personal and corporate devices, mobile and in-person workforces, biometric authentication and traditional login, among other variables, makes 100 percent awareness a tricky proposition. Per the release, one in three employees use unapproved apps and tools to boost productivity.

The XAM concept is to give companies the ability to manage unsanctioned, and therefore insecure, apps employees may be using in breach of policy.

By enabling control of so-called shadow IT not secured behind single sign-on (SSO) and other unprotected devices, Trelica helps the 1Password Extended Access Management platform close the “trust-access gap” – “the security risks posed by unmanaged devices and apps accessing company data without proper governance controls.”

“The greater the gap, the greater the risk of a data breach,” Shiner says.

In addition to shadow IT management, Trelica will help “optimize software licenses to uncover cost-saving opportunities, automate workflows for smarter resource allocation, and maintain continuous compliance with standards such as SOC 2 and ISO/IEC 27001 through comprehensive audit trails and robust policy.”

Related Posts

Article Topics

 |   |   |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events