Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

OneLogin Eases Adoption of Zero Trust Framework with Delegated Administration

Launch of New Offering Comes on the Heels of the White House Cybersecurity Executive Order

by The Gurus
July 16, 2021
in Featured, News, Press Releases
onelogin
Share on FacebookShare on Twitter

OneLogin has announced the launch of its Delegated Administration offering, which enables organizations to adopt the Zero Trust principle of least privilege access. By empowering IT administrators to easily delegate access on a granular level, organizations can balance productivity requirements with the need to aggressively protect their organization against security threats.

OneLogin’s Delegated Administration tool allows organizations to adopt the principle of least privilege access to enable their Zero Trust framework. Organizations can improve their security footpoint by granting only the level of access needed to get the job done. By having the ability to provide refined admin privileges based on any combination of user, app, and role, companies can easily balance security with the need to enable the business.

According to a recent survey of over 700 technology leaders conducted by OneLogin, 75% of organizations agree that a Zero Trust model is key to breach prevention. Nevertheless, less than 12% of organizations actually have a strategy in place. In fact, 66% of respondents have admitted that some or a few users are being granted access privileges beyond what they require. Eighteen percent conceded that all their users have excessive privileges.

“For organizations to adopt a Zero Trust framework, they must embrace the concept of least privilege access, meaning users are only given the minimum levels of access needed to perform their job. However, maintaining this baseline is challenging when organizations must accelerate employee productivity. As a result, IT and Security teams are challenged with balancing the operational needs of the business and maintaining a strong security posture,” said Damon Dean, Chief Product Officer, OneLogin. “OneLogin’s Delegated Administration enables organizations to adopt the Zero Trust principle of least privilege access. Delegating simpler IT tasks to business units, departments, or teams, alleviates the burden on IT to support access requests and, thereby, reduces costs, saves time and ultimately protects their organization against security threats.”

OneLogin’s Delegated Administration offers organizations three unique capabilities:

  1. Enforce the Zero Trust principle of least privilege across your entire ecosystem: Organizations increase their security posture by better controlling their user permissions, users are more productive because they have the access they need to do their job, and IT teams will be freed from having to regularly audit privileges that are too wide-ranging.
  2. Significantly reduce the risk of privileged account takeover: Reducing the attack surface, especially within privileged access, significantly strengthens your organizations’ security posture and enables a key element of the Zero Trust Framework. Plus, Delegated Administration is a huge relief and peace-of-mind for security teams who are constantly on the watch for risks like over-privileged users.
  3. Save time and reduce costs with automated role-based privilege assignment: Employees will have the right amount of privileges for their job on day one, giving them a jumpstart on productivity. Central IT will improve security and increase productivity simultaneously.

For more information, visit the OneLogin Zero Trust Resource Center.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Security and HR phishing scams are luring employees, KnowBe4 report finds

Next Post

It’s time to get ahead of weaponised vulnerabilities

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information