• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
    • Compliance
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Portal
    • Contact Support
    • Communities
    • Services
  • Partners
    • Partner Ecosystem
    • Become a Partner
    • Partner Portal
    • Find a Partner
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Identity Governance & Administration
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Identity Governance & Administration
Related Tags
  • access governance
  • Compliance
  • governance
  • iam
  • Identity and Access Management
  • Identity Governance
  • identity manager
  • IGA
  • one identity
  • Thought Leadership
Options
  • Subscribe by email
  • Posts RSS
  • More
  • Cancel
  • Tags
  • Subscribe by email
  • More
  • Cancel
  • Join Our Session on Tuesday at Gartner IAM Summit. Identity Is "The Force" Behind Sky's Digital Transformation

    Join Our Session on Tuesday at Gartner IAM Summit. Identity Is "The Force" Behind Sky's Digital Transformation

    scott c -quest-
    scott c -quest-
    At Sky, identity sits at the heart of our digital workplace. We’ve positioned it as one of the key drivers for our digital transformation. As you can hear in our session at the Gartner IAM Summit in Las Vegas, this effort is not our first inves...
    • 21 Nov 2017
  • My Favorite Part of the Gartner IAM Summit

    My Favorite Part of the Gartner IAM Summit

    Jackson Shaw
    Jackson Shaw
    Each year, we (One Identity) participate in the Gartner Identity and Access Management Summit. Of course we do, we’re an IAM vendor and would be foolish to skip this event. I love the valuable sessions and insight from Gartner, the interaction ...
    • 6 Nov 2017
  • Get ready for May 2018 and the European Union’s General Data Protection Regulation (GDPR)

    Get ready for May 2018 and the European Union’s General Data Protection Regulation (GDPR)

    Todd Peterson
    Todd Peterson
    As if PCI, SOX, HIPAA, GLB, and all the other alphabet-soup regulations aren’t enough to bog down your security program, we now have a new one rearing its ugly head. The new regulation is the European Union General Data Protection Regulation &...
    • 2 Nov 2017
  • Simplifying Identity Governance and Streamlining Compliance

    Simplifying Identity Governance and Streamlining Compliance

    Allison Main
    Allison Main
    The controls used in the cardholder data environment (CDE) and the risks considered during the CDE scoping effort, such as all possible user access to account data (CHD and SAD), the DSS points them to consider whether the organization identified “al…
    • 29 Oct 2017
  • Payment and Business Applications Security Features Are Insufficient

    Payment and Business Applications Security Features Are Insufficient

    Allison Main
    Allison Main
    Using the user, group and role-based management features of payment and business applications that accept cardholder data or sensitive authentication data is not enough to secure your data and ensure compliance with PCI DSS requirements. The set of
    • 28 Oct 2017
  • Payment Card Industry Data Security Standard

    Payment Card Industry Data Security Standard

    Allison Main
    Allison Main
    While relatively a newcomer to the IT compliance scene, PCI DSS has been mandated by all members of the PCI Security Standards Council, including Visa International, MasterCard Worldwide, American Express, Discover Financial Services and JCB Internat…
    • 26 Oct 2017
  • How to Surpass Payment Card Industry (PCI) Data Security Standard (DSS) Compliance

    How to Surpass Payment Card Industry (PCI) Data Security Standard (DSS) Compliance

    Allison Main
    Allison Main
    For many organizations, compliance with data security standards doesn’t seem to be getting easier. IT security compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities
    • 25 Oct 2017
  • Winter is coming! But in Malta in November it still feels like summer!

    Winter is coming! But in Malta in November it still feels like summer!

    Andrew.Clarke
    Andrew.Clarke
    As we prepare for the One Identity UNITE EMEA Partner Conference on the beautiful island of Malta in southern Europe, we also celebrate One Identity’s successful first year as an independent company. To demonstrate that success and how we are p...
    • 6 Oct 2017
  • And the survey says….”Good ol’ Fashioned IAM is Just Too Risky!”

    And the survey says….”Good ol’ Fashioned IAM is Just Too Risky!”

    Todd Peterson
    Todd Peterson
     We’ve all been there – you’ve been doing something the same way for years and it seems to be going well. You’re in a groove and everything happens like clockwork. You know exactly what you’re doing and the results...
    • 28 Sep 2017
  • ISO/IEC 27001 From an Auditor's Perspective

    ISO/IEC 27001 From an Auditor's Perspective

    Allison Main
    Allison Main
    For many organizations, compliance with data security standards doesn't seem to be getting easier. IT security compliance efforts are forever competing with projects that may or may not address information security threats, operational vulnerabiliti…
    • 25 Sep 2017
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Ensuring Compliance With HIPAA Security Rule Requirements

    Danielle.Vorce
    Danielle.Vorce
    The user, group and role-based management features of certified Electronic Health Record (EHR) systems is not enough to ensure compliance with HIPAA Security Rule requirements. Other systems need to be considered, such as media storing and controls …
    • 18 Sep 2017
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main
    For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities and da...
    • 8 Sep 2017
<>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center