OneLogin-logo

OneLogin - Security

(15)
  • Deployment:
  • Company Size:SML
  • Features:
  • Platforms:
  • Pricing:

Details

High-profile breaches are making headlines weekly, and the number of incidents continues to rise. Multi-Factor Authentication (MFA) has become the standard to prevent unauthorized users from accessing corporate data with passwords alone. Protect your organization against growing attacks with policy-based access control for login, and password resets based on location, application and user privilege level. In addition to OneLogin's own free one-time password (OTP) app, OneLogin comes pre-integrated with Duo Security, RSA SecurID and many others. Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall.

Features

Pricing Model
  • Monthly subscription per user
  • Yearly subscription per user
  • Metered per minute
  • Monthly site license
  • Yearly site license
  • Flat fee
  • Monthly subscription
  • Percentage-based (% of collections or claims)
  • Fee-based (fixed $/claim)
  • Hybrid (combination of % and fixed amount/claim)
Target Company Size
  • Startup
  • Small-to-Medium Business
  • Enterprise
Service Terms Offered
  • Commitment Free
  • Free Setup
  • Free Cancellation
  • Money Back Guarantee
  • Month-to-Month Option
  • Keep Original Number
  • Customizable Plans
  • Free In-Network Calls
  • Unlimited Minutes
  • International Calls
  • Reduced Price for Multiple Users
  • Account Manager
Mobile Apps Offered
  • None
  • iOS
  • Android
Support Features
  • FAQs Section
  • Tutorials
  • Telephone Support
  • Email Support
  • 24/7 Support
  • Online Chat
  • Forum
  • In-Person Training
  • Social Media
  • Knowledge Base
  • Webinars
Compatible Operating System(s)
  • Windows
  • iOS
  • Linux
  • Mac
  • Android
Deployment
  • Hosted/Cloud
  • On-Premise
  • Mobile
Mobile friendly?
  • Yes
  • No
Price
  • 1 - Inexpensive
  • 2
  • 3 - Moderate
  • 4
  • 5 - Expensive
Features
  • 1 - Limited features
  • 2
  • 3 - Moderate
  • 4
  • 5 - Full featured
Security Features
  • Multi-Factor Authentication
  • Endpoint Security
  • Anti-Virus Protection
  • Malware Protection
  • Single Login
  • App Catalog
  • Unified Directory
  • Adaptive Authentication
  • Mobile Identity
  • Compliance
  • User Provisioning
  • Virtual LDAP
  • Remote Wipe
  • Content Encryption
  • Digital Rights Management
  • Analytics and Reporting
  • Secure Content Storage and Sharing
  • e-Signature
  • Inbound and Outbound Traffic Filtering
  • Data Loss Prevention
  • Device Control
  • eDiscovery
  • Enterprise Mobility Management
  • Whitelists and Blacklists
  • File Tracing and Shadowing
  • Content Filtering
  • Static and Dynamic Attack Protection
  • Dashboards
  • Application Hardening
  • Application Behavior
  • Web Protection
  • Exploit Mitigation
  • Ransomware Mitigation
  • Payload Analysis
  • Policy Management
  • Cloud Protection
  • Network Security
  • Security Management
  • Server Security
  • Data Backup and Recovery
  • Gateway Security
  • Visualization
  • Firewall
  • Sandboxing
  • Spam Blocker
  • Email Protection
  • Security Trend Reporting
  • Password Security Enforcement

Pricing

Request a custom quote for your business

Get Pricing

Recommended Articles

3 Reasons Cloud Security is More Important than Ever

Thanks to the availability and affordability of cloud-based infrastructure and business software solutions, the trend...

The Top 3 Companies Pioneering the IaaS Market

Cloud services and infrastructure companies such as AWS, Google Cloud, and Microsoft Azure give you all the tools and...

Anti-Virus Software Won't Protect Your Business

In today’s era of sophisticated hacks and with unprecedented levels of cybercrime and data breaches occurring, ...

4 Ways AI is Redefining Enterprise Security

Artificial Intelligence (AI) isn’t necessarily a new technology, but it’s been perceived more as a work o...

The Most Notorious Cyber Attacks Of the Past Decade

From Yahoo! to NotPetya - so much happened in the cyberspace during the course of these 10 years. Here's a flashback.

How to Protect Your Business from Known Cyber Security Risks

Maintaining tight cybersecurity within your business has some standard protocols - and the right security software is one of them.

Let's Make a Deal: Basic Steps for Switching to Cloud Computing

Moving your business data online doesn't have to be a scary proposition.

5 Steps Toward PCI DSS Compliance

The latest in credit-card protection requires a new approach.

Identity Theft: OpenID and What It Means for Web Security

The new open-source identity initiative is finally kick-starting online-identity standards.

Colocation-Center Security Trends

What are colocation datacenters doing to protect your company's assets?

The Essential Guide to Spam Control

What you need to know about managing junk messages.
Loading Reviews..