• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs

Identity Governance & Administration

  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Identity Governance & Administration
Related Tags
  • access governance
  • Compliance
  • governance
  • iam
  • Identity and Access
  • Identity and Access Management
  • Identity Governance
  • identity manager
  • one identity
  • Thought Leadership
Options
  • Subscribe by email
  • Posts RSS
  • More
  • Cancel
  • Tags
  • Subscribe by email
  • More
  • Cancel
  • Compliant until breached: The case for Digital Identity

    Compliant until breached: The case for Digital Identity

    Robert Byrne
    Robert Byrne
    Why is breach compliance important for organizations? If companies complying with their regulatory obligations, why are they still being breached?
    • 20 Feb 2025
  • Unify your identity platform: Address the IAM trends

    Unify your identity platform: Address the IAM trends

    Bruce Esposito
    Bruce Esposito
    Streamline your identity platform to effectively address current Identity and Access Management (IAM) trends.
    • 27 Jan 2025
  • What is Behavior-driven analytics in cybersecurity

    Behavior Driven Governance

    Bruce Esposito
    Bruce Esposito
    There’s an unfortunate truth about applications and access in the enterprise. Many applications are underutilized. This means patches and updates can fall down the to-do list of already-stretched IT service desks. Naturally, this increases the ...
    • 11 Dec 2024
  • Breach by Breach: Why Traditional IAM Is Now Obsolete

    Breach by Breach: Why Traditional IAM Is Now Obsolete

    Bruce Esposito
    Bruce Esposito
    In many ways, identities are arguably now at the frontier of cybersecurity – which means traditional identity and access management (IAM) approaches are increasingly inadequate.
    • 5 Nov 2024
  • Context-based requests for Identity Manager

    Understanding Context-based requests for SAP in Identity Manager

    Abdullah Ahmad
    Abdullah Ahmad
    Requesting an SAP role with Context is considered a Context-based request, and an end user has multiple options for creating a request.
    • 15 Aug 2024
  • introducing XIAM: external identity and access management

    Introducing XIAM: A fresh approach to external identity and access management

    Josh Karnes
    Josh Karnes
    XIAM, which we have taken to pronouncing “zi-yam” described it as “External Identity and Access Management” is an IAM cybersecurity solution that is becoming more popular.
    • 14 Aug 2024
  • governing access to the microsoft dynamics estate

    Governing access to the Microsoft Dynamics estate

    Robert Byrne
    Robert Byrne
    ERP and CRM systems are key parts of an organization’s business infrastructure and digital transformation initiatives. One Identity and governing access to the microsoft dynamics estate.
    • 2 Aug 2024
  • what is identity sprawl - the new scourge of IAM

    Tackling identity sprawl: The new scourge of IAM

    Bruce Esposito
    Bruce Esposito
    Learn what identity sprawl is, and why it is the new IAM scourge. Most definitions of ‘sprawl’ will include references to developing irregularly or carelessly, and without restraint.
    • 15 Jun 2024
  • from sap idm to one identity the preferred path for seamless migration

    From SAP IDM to One Identity: The preferred path for seamless migration

    Robert Kraczek
    Robert Kraczek
    SAP recently announced the end-of-life for SAP Identity Manager (IDM). Learn why One Identity is the preferred migration platform for SAP IDM.
    • 4 Jun 2024
  • How One Identity can support SAP environments

    How One Identity can support SAP environments

    Robert Kraczek
    Robert Kraczek
    As SAP Identity Management (IDM) reaches its end-of-maintenance, customers can migrate to One Identity. Learn more how to seamlessly migrate.
    • 28 May 2024
  • Taming the many-headed monster of data privacy law

    Taming the many-headed monster of data privacy law

    Bruce Esposito
    Bruce Esposito
    At our last count, there were 120 jurisdictions around the globe, each with their own data privacy legislation. Learn how data protection works in the world of cybersecurity.
    • 20 May 2024
  • Data breach vigilantes: CIAM and IGA for customer data protection

    Data breach vigilantes: CIAM and IGA for customer data protection

    Josh Karnes
    Josh Karnes
    Learn how CIAM (Customer Identity and Access Management) and IGA (Identity Governance & Administration) can make a powerful security duo to protect customer identities and data.
    • 7 May 2024
>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center