• No results found

Insight Zone. Data Security Executive Interview

N/A
N/A
Protected

Academic year: 2021

Share "Insight Zone. Data Security Executive Interview"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

Data Security

2015

Executive

Interview

Insight Zone

(2)

THE CLOUD = SAFE

Every App, User, & Device Secured

Eliminate Passwords

Increase Security

Ensure Compliance

(3)

www.zonese7en.com

OneLogin, an innovator in enterprise identity management, provides the industry’s leading SaaS solution for managing internal and external users across all devices and applications.

OneLogin is named Leader in Forrester WaveTM: B2E Cloud IAM, Visionary in Gartner’s IAM as a Service Magic Quadrant and a Major Player in IAM by IDC. OneLogin’s cloud identity management platform provides more than 2,000 customers with secure single sign-on, multi-factor authentication, integration with common directory infrastructures such as Active Directory and LDAP, user provisioning and more. OneLogin is SAML-enabled, provides an open source SAML toolkit adopted by over 400 ISV’s, and is pre-integrated with over 4,000 applications commonly used by today’s enterprises, including Microsoft Office 365, Google Apps for Work, Salesforce.com, ServiceNow, BMC Remedyforce, Box, Egnyte, EMC Syncplicity, Oracle CRM On-Demand, SuccessFactors, WebEx, Workday, and Zendesk. OneLogin, Inc. is backed by CRV, The Social+Capital Partnership, and Scale Venture Partners.

www.onelogin.com Welcome to ZONE SE7EN’s

Executive Interview with Charles Read, Alliances Director, OneLogin.

We asked Charles why two-factor authentication is becoming a must for companies in securing their data, and how the introduction of new mobile technologies has impact access controls and data security. We learn more about OneLogin, about Charles’s views on whether the username and password will eventually become obsolete, and their vision for the future in the data security marketplace.

View Charles’s Executive Interview to learn why OneLogin could be the better choice for your organisation’s data security.

Data Security 2015

Executive Interview

Charles Read

Alliances Director,

OneLogin

Charles has been working in the IT industry for the last 14 years helping North American SaaS companies expand their operations into the EMEA. With a wide ranging background working with with both hardware, software and services vendors across every industry, Charles now brings his broad experience to helping OneLogin build their channel and business development program in EMEA.

(4)

“OneLogin was founded back in early 2010 by two Danish brothers, the Pedersen brothers, who originally came out of Zendesk, a very popular IT service management platform in Europe. They took their idea of single sign-on to San Francisco where they founded the company. Really it was driven by two principals they were seeing in all the customers they spoke to. One was that users didn’t need another username and password; it was becoming laborious for companies to manage that. Secondly, companies wanted a point of control for their cloud users. So rather than having different systems for different users all over the place, they had just one place where they control everything at the directory level. That was really the founding thought for OneLogin.

From there, we’ve grown the product to include services that not only address identity access management and the ability to control user access, but also actually being able to create and manage the users themselves within these services. So now companies can have a completely automated experience, when users join the company or leave the company. That’s where

Question 1

Tell us more about

OneLogin?

Question 2

Why is two-factor

authentication becoming

a data security ‘must

have’ for many

organisations?

“Reports suggest that 95% of all hostile attacks are now coming from stolen credentials. Two-factor authentication is becoming a must for organisations that are using cloud services, particularly given that most of the users are accessing these services from outside the firewall and traditional security that would normally control the perimeter is no longer valid for those scenarios.” n

Question 3

The use of mobile devices

has risen significantly

in business today, an

essential part of working

life. How does this and

the introduction of new

mobile technologies

impact access controls

and data security?

“When an organisation loses a mobile device, there’s still a lot of mystery around what was on the device, what the user had access to, what services were enabled in terms of applications. The proliferation of cloud services and their associated native apps on those devices has made the job of managing security and data an even bigger challenge for organisations. What we’re seeing, and the trends that we’re focusing on at OneLogin,

“The proliferation of

cloud services and their

associated native apps on

those devices has made the

job of managing security

and data an even bigger

(5)

www.zonese7en.com

“OneLogin’s vision is true global expansion. At the moment, we already have a very strong presence in North America, an expanding presence in the European market and the rest of the Middle East, and a floating presence in Asia-Pacific. As all those operations grow, we will continue to make investments in our staff, making sure that we deliver a great, top quality service that our customers are used to. We’ve already made big inroads into EMEA very early in the company’s history by investing in European data centres and we want to see that grow along with new services and technologies that address not just the traditional single sign-on space, but also things

Question 4

Do you agree or disagree

that user names and

passwords will eventually

become obsolete?

“As a sole source of authentication, the traditional username and password will mutate. New cloud services encourage our customers to put ever-more confidential data up in the cloud and the multi-layered security approach will be a requirement for all organisations that we see out there.

You’re still going to have user names although they may change to become digital certificates or other forms of authentication; you’re still going to have passwords although they may become biometrics, for example. In essence though, it is still a user name and password that organisations will use to authenticate users.”

n

Question 5

What is OneLogin’s vision for the future in the data

security marketplace?

like user provisioning capabilities into other services and native app authentication to give users that experience on mobile devices that they also have in the traditional desktop space.

The real focus for OneLogin though is to try and get into solving real business issues for our customers. We spend a lot of time talking about technology but behind that, there are drivers that relate to things like reducing costs, increasing productivity, which is how we can help customers really grow their businesses. That is where OneLogin sees the future of our products, our people and our customers.”

n

“New cloud services encourage our customers to put

(6)

References

Related documents

This white paper highlights the need for a new approach to enterprise mobile security — one that provides seamless data visibility and protection by securing the data at rest or

Finally, organizations should consider mobile security technologies that include authentication, encryption of stored data, security for data in transit,

The discussion in this chapter of the history of women’s involvement in ancient philosophy and later science shows that the prevailing societal dynamics militated against

Related to this has been the need to secure agreement between the EU’s main institutions that have been involved in telecommunications policy development: the

In addition to reporting, we also focused on “assignment” of debt, accounts sent by agencies to private collection firms or the Other Agency Accounts unit (OAA) at the Department

Therefore, most research in sport and exercise is based on Csikszentmihalyi‟s nine dimensions, through Jackson‟s early work (e.g., 1996) and subsequent development of the Flow

Query Nested Join Scalar ada kelompok data kecil waktu yang dibutuhkan tidak ada perubahan dari relasi sebelumnya untuk data jumlah data yang kecil tetap konsisten

Why else would we spend disproportionate time and money reinforcing the data centre perimeter with technologies such as authentication, access management, firewalls, network