At Sky, identity sits at the heart of our digital workplace. We’ve positioned it as one of the key drivers for our digital transformation.
As you can hear in our session at the Gartner IAM Summit in Las Vegas, this effort is not our first inves...
Each year, we (One Identity) participate in the Gartner Identity and Access Management Summit. Of course we do, we’re an IAM vendor and would be foolish to skip this event. I love the valuable sessions and insight from Gartner, the interaction ...
As if PCI, SOX, HIPAA, GLB, and all the other alphabet-soup regulations aren’t enough to bog down your security program, we now have a new one rearing its ugly head. The new regulation is the European Union General Data Protection Regulation &...
The controls used in the cardholder data environment (CDE) and the risks considered during the CDE scoping effort, such as all possible user access to account data (CHD and SAD), the DSS points them to consider whether the organization identified “al…
Using the user, group and role-based management features of payment and business applications that accept cardholder data or sensitive authentication data is not enough to secure your data and ensure compliance with PCI DSS requirements.
The set of
While relatively a newcomer to the IT compliance scene, PCI DSS has been mandated by all members of the PCI Security Standards Council, including Visa International, MasterCard Worldwide, American Express, Discover Financial Services and JCB Internat…
For many organizations, compliance with data security standards doesn’t seem to be getting easier. IT security compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities
As we prepare for the One Identity UNITE EMEA Partner Conference on the beautiful island of Malta in southern Europe, we also celebrate One Identity’s successful first year as an independent company. To demonstrate that success and how we are p...
We’ve all been there – you’ve been doing something the same way for years and it seems to be going well. You’re in a groove and everything happens like clockwork. You know exactly what you’re doing and the results...
For many organizations, compliance with data security standards doesn't seem to be getting easier. IT security compliance efforts are forever competing with projects that may or may not address information security threats, operational vulnerabiliti…
The user, group and role-based management features of certified Electronic Health Record (EHR) systems is not enough to ensure compliance with HIPAA Security Rule requirements. Other systems need to be considered, such as media storing and controls …
For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities and da...