iPad app for enterprise single sign-on
Posted on 20 July 2012.
Bookmark and Share
OneLogin announced OneLogin for iPad which seamlessly extends OneLogin’s cloud-based identity access management solution, allowing mobile users to easily move from desktop to laptop to mobile device and access the same apps, using the same network credentials.


For increased security, OneLogin for iPad leverages the same multi-factor authentication as OneLogin’s web-based solution and works with partners including RSA SecurID, Symantec VIP Access, Yubico and VASCO DIGIPASS & IDENTIKEY. The app also allows for identity-driven iPad security, allowing IT executives to address BYOD security concerns by managing access down to the user and application level.

“Mobile device management (MDM) has done a good job of securing the first wave of mobile devices entering the workforce, but can often fall short in providing capabilities that secure the applications themselves,” notes Eric Ahlm, research director with Gartner. “We are seeing a trend of companies struggling with the ‘next app’ phenomenon asking Gartner how to secure a broader set of applications on mobile platforms beyond email.”

Netflix’s IT department, for example, notes that iPads are the dominant tablet used by employees remotely. The company avoids BYOD pitfalls with OneLogin for iPad by managing user access instead of thousands of individual devices.

Users keep their personal apps and data private, while corporate applications and data remain secure and protected. IT can also roll out new SaaS apps without having the employees needing to install anything. They can access the new app via the OneLogin app portal inside of their iPads, workstations or laptops.

“OneLogin for iPad streamlines the process of connecting remotely, greatly improving employee productivity,” said Mike Kail, vice president of IT operations at Netflix. “There are no forgotten passwords or usernames for individual web apps—everything works with a secure, single sign-on. Plus, we can revoke access quickly and easily to any mobile user’s cloud-based apps simply by deleting the account from Active Directory. This capability gives me tremendous peace of mind about the security of our corporate applications and data.”





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //