• Products
    • View all products
    • Free trials
    • Identity Governance and Administration
      • Identity Manager
      • Identity Manager Data Governance
      • Starling Connect
    • AD Account Lifecycle Management
      • Active Roles
      • Authentication Services
      • Starling Connect
      • Password Manager
    • Privileged Access Management
      • One Identity Safeguard
      • Safeguard Authentication Services
      • Safeguard for Privileged Analytics
      • Safeguard for Privileged Passwords
      • Safeguard for Privileged Sessions
      • Safeguard for Sudo
    • Access control
      • Defender
      • Starling Two-Factor Authentication
      • Password Manager
    • syslog-ng Log Management
  • Integrations
    • Integrations Overview
    • Cloud Infrastructure
    • Access Management
      • Ping
    • Applications
      • SAP
    • Privileged Access Management
      • Blue Prism
      • HashiCorp
    • Data
    • Compliance
  • Solutions
    • All Solutions
    • Secure the organization
    • Drive operational efficiencies
    • Enable compliance and auditing
    • Support digital transformation
    • Enhance log management
  • Resources
    • Blogs
      • Blogs A to Z
      • AD-Centered IAM
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Customer Stories
    • Documents
    • Events
    • Webcasts
    • Technical Documentation
    • Videos
    • Whitepapers
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Identity Governance & Administration
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Identity Governance & Administration
Related Tags
  • Compliance
  • events
  • governance
  • iam
  • Identity and Access
  • Identity and Access Management
  • Identity Governance
  • identity manager
  • one identity
  • Thought Leadership
Options
  • Subscribe by email
  • Posts RSS
  • More
  • Cancel
  • Tags
  • Subscribe by email
  • More
  • Cancel
  • Worldwide conglomerate easily achieves IGA success with its digital transformation

    Worldwide conglomerate easily achieves IGA success with its digital transformation

    Allison Main
    Allison Main
    Learn how Otto Group IT attained IGA success in its digital transformation with Identity Manager.
    • 19 Nov 2019
  • With Identity Manager, university's research data is protected

    With Identity Manager, university's research data is protected

    Laureen.Smith
    Laureen.Smith
    Radboud University boosts agility, cuts costs and positions itself for the future with effective identity and access management
    • 13 Sep 2019
  • Bank invests in faster, more secure IAM processes

    Bank invests in faster, more secure IAM processes

    Allison Main
    Allison Main
    Learn how One Identity Manager helped OeKB's bank IT security team overcome IAM challenges
    • 13 Aug 2019
  • See how six organizations simplified IAM for SAP and other platforms

    See how six organizations simplified IAM for SAP and other platforms

    Alex Binotto
    Alex Binotto
    Learn how companies from various industries, including finance, higher-ed, insurance and manufacturing simplified SAP identity management.
    • 13 Aug 2019
  • IAM: a view from a partner’s POV

    IAM: a view from a partner’s POV

    One Identity
    One Identity
    This is a guest blog post by Brihteja. Brihteja is innovative IT company from Slovenia. Starting in 2011 with three persons only, the company has grown to sixteen employees. From the very beginning, knowing the importance of security, we are co...
    • 8 Jan 2019
  • Starling Connect target system connectors at GA

    Starling Connect target system connectors at GA

    Allison Main
    Allison Main
    Alex Binotto is the Senior Product Manager for Starling Connect and has provided the list of connectors and target systems available now and what is coming soon. If you have a requested system, please email Alex. Target System...
    • 17 Aug 2018
  • New Release unifies governance for on-premise, hybrid and cloud deployments

    New Release unifies governance for on-premise, hybrid and cloud deployments

    Allison Main
    Allison Main
    Starling Connect is now GA Today, organization must launch new services and cloud applications quickly to stay competitive. As we all know, Identity and Access Management (IAM) is the platform to manage these identities through a standard set of proc…
    • 17 Aug 2018
  • Look for One Identity at Gartner Catalyst

    Look for One Identity at Gartner Catalyst

    mlfrance
    mlfrance
    In addition to our regular participation at the Gartner Risk and Security Summit and the Gartner Identity and Access Management Summit, One Identity will be at the Gartner Catalyst show – August 20-23 in San Diego, California. The highlight, fo...
    • 8 Aug 2018
  • B. Braun in Germany automates identity and access management for security and compliance while enabling digital transformation

    B. Braun in Germany automates identity and access management for security and compliance while enabling digital transformation

    Allison Main
    Allison Main
    For B. Braun, one of the world´s leading providers of healthcare solutions based in Melsungen, Germany, the challenge was particularly acute. B. Braun needed to increase security, guarantee compliance, and control access to company data, e...
    • 12 Jun 2018
  • Union Investment gets speed, flexibility and compliance from Identity Manager

    Union Investment gets speed, flexibility and compliance from Identity Manager

    Allison Main
    Allison Main
    In the highly regulated investment industry, security and speed are critical. Union Investment has been in business for more than 60 years with over 320 billion in asset and management.  Union Investment needed a flexible identity and access man...
    • 4 Jun 2018
  • Slaying the IAM Beast Is a Prerequisite for Successful Digital Transformation

    Slaying the IAM Beast Is a Prerequisite for Successful Digital Transformation

    Rogier.Egberink
    Rogier.Egberink
    IAM programs should empower digital transformation, but organisations are at risk of being held back by mistakes from the past. Digital transformation is rapidly taking over boardroom agendas and giving businesses the tremendous challenge of reevalua…
    • 13 Feb 2018
  • Measuring Identity Governance – Five practical steps

    Measuring Identity Governance – Five practical steps

    Paul Walker
    Paul Walker
    It’s a fair assumption that you’re not measuring your organisation’s identity access governance (IAG). And, if you are, it’s likely to be via an indirect measure, such as the risk of data breaches. But first, let’s begin...
    • 13 Feb 2018
<>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2021 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support