Join Joe Campbell, One Identity Principal Security Advisor for his session"'Identity in Depth';The Evolution of Defense" on Monday June 19th at 4:15PM in Ballroom X.
Here is a sneak peak:
Traditional ‘Defense in Depth’ IT sec...
Join us April 19th for our breakfast event "Overcome Native AD Management Tool Limitations" at Privé Cafe at Marina at Keppel Bay in Singapore from 8am-11am GMT.
Active Directory, simple and secure
The capabilities of native Active Directory...
Today, more than ever, organizations must address the proliferation of cloud-based applications and digitally transform their business to stay ahead of the competition and meet customer’s demands. While cloud applications provide convenient an...
Using the single, familiar Active Roles interface, there is no longer a need to be constantly switching between consoles, and writing complex scripts in an attempt to automate, because Active Roles does it for you.
Creation of a user, for exam...
With version 7.1, the One Identity Active Roles solution has expanded its scope to cover both on-prem AD (as its always done) and Azure AD. Here’s an explanation of how it works.
The ADSI provider serves as the interface between the Active Rol...
Over the past couple of years Azure Active Directory and Office 365 have been quietly and steadily gaining ground within our businesses. While many administrators have been busy managing their environments, the level of effort involved in their dail…
Many times companies use an initial password that is partially or completely static (Summer2017?), or sometimes they use a formula which includes partial data of the user such as the month of birth + the three final digits of their Social Security, …
The expense to unlock a user’s account goes far beyond billable helpdesk hours but also lost the productivity of everyone impacted by the lack of user access – including the user, the user’s internal and external clients – and...
We recently had the opportunity to host an interview with Tim Eichmann, Head of Cloud & Infrastructure at Core Technology Systems (UK) Limited and One Identity.
Core Technology Systems (UK) Limited help organisations large and small to achie...
In government, gaining access to privileged accounts is a hacker’s dream. Without proper management, these accounts offer unlimited access to a wealth of valuable information.
Our on-demand knowledge webcast series, addressing the directives Federal CIO Tony Scott gave to agencies for the 30-day Cybersecurity Sprint concludes with a discussion of the fourth and final directive:
“Dramatically accelera...