• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Identity Governance & Administration
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Identity Governance & Administration
  • All tags
  • Identity Governance
  • access control
  • access governance
  • Compliance
  • Conference
  • customer stories
  • Customer Success
  • cybersecurity
  • Digital Transformation
  • Event
  • events
  • Gartner IAM Summit
  • governance
  • HIPAA compliance
  • HIPAA Security Rule requirements
  • iam
  • IAM solutions
  • Identity and Access
  • Identity and Access Management
  • identity manager
  • identity mangaer
  • KuppingerCole
  • one identity
  • Security
  • Thought Leadership
  • Webcast
  • Data breach vigilantes: CIAM and IGA for customer data protection

    Data breach vigilantes: CIAM and IGA for customer data protection

    Josh Karnes
    Josh Karnes

    In today's digital battleground, it seems like a week doesn’t go by where we don’t hear about some kind of data breach involving identity security. It's easy to become desensitized to the constant stream of identity security compr…

    • over 1 year ago
    • Blogs
    • Identity Governance & Administration
  • Identity risk management: What is it and how can you achieve it?

    Identity risk management: What is it and how can you achieve it?

    Ted Ernst
    Ted Ernst

    Risk. It’s more than just an infuriating board game from your childhood. And when identity risk is involved in your cybersecurity landscape – and it will be involved, since identity is one of the most easily accessible and most frequently attacked facets…

    • over 1 year ago
    • Blogs
    • Identity Governance & Administration
  • One Identity Manager version 9.2 has been released GA

    One Identity Manager version 9.2 has been released GA

    Ted Ernst
    Ted Ernst

    Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk and satisfies compliance by giving users access to data and applications they need – and only what they need – whether on-premises, hybrid…

    • over 1 year ago
    • Blogs
    • Identity Governance & Administration
  • Revolutionizing continuous governance

    Revolutionizing continuous governance

    Serkan Cetin
    Serkan Cetin

    In an era where data security and access management are crucial, organizations are constantly on the lookout for modern ways to enhance their governance strategies. What if you could not only manage user identities and access rights but also extend this…

    • over 1 year ago
    • Blogs
    • Identity Governance & Administration
  • Identity Governance Frameworks importance

    Identity Governance Framework: What it is, why it’s important

    Robert Byrne
    Robert Byrne

    The sheer number of users, identities, devices, data, applications and environments within enterprises makes managing user permissions and access while maintaining compliance a unique challenge. This increasingly complex organizational ecosystem makes…

    • over 2 years ago
    • Blogs
    • Identity Governance & Administration
  • battling identity sprawl with unified identity security

    Battling Identity Sprawl with Unified Identity Security

    Joe Garber
    Joe Garber

    The traditional perimeter is eroding due to the mass adoption of cloud computing, the proliferation of SaaS applications, and a major rise in the number of identities — both human and non-human — that businesses are now required to secure. To learn more…

    • over 3 years ago
    • Blogs
    • Identity Governance & Administration
  • With Identity Manager, university's research data is protected

    Laureen.Smith
    Laureen.Smith

    The IT department of Radboud University (the Netherlands) manages 40,000 to 50,000 identities. With around 25,000, the school also has an academic hospital, with faculty and staff, along with researchers from all over the world, not to mention invited…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Show Us Your Best #GartnerSec Selfie!

    Danielle.Vorce
    Danielle.Vorce

    We are calling all Gartner Security & Risk Management Summit attendees to show us your most creative selfie in front of our #DeptofYes Wallscape that is located in our Security: Welcome to the Security Department of Yes Hospitality Suite in National…

    • over 9 years ago
    • Blogs
    • Identity Governance & Administration
  • Andy Vallila (SonicWALL and One Identity) and Brian Kelly, University CISO, to Discuss Cybersecurity Issues at the Campus Technology 2016 Conference in Boston

    Andy.Vallila
    Andy.Vallila

    Anna just started her freshman year at her dream school. Nervous and excited to start her college journey, she has many things on her mind, such as arriving at her 8:00 a.m. class on time, finding the perfect study group and acing English 101. As with…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Big Decline in Federal Leaders Confidence in Agency Cybersecurity

    Jeffrey Honeyman
    Jeffrey Honeyman

    We commission several surveys of the IT marketplace every year. It’s one of the ways by which we keep up with broader technology trends so as to make sure that our security solutions meet your needs.

    With so many changes taking place in technology…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities and daily business…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • ISO/IEC 27001 From an Auditor's Perspective

    ISO/IEC 27001 From an Auditor's Perspective

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn't seem to be getting easier. IT security compliance efforts are forever competing with projects that may or may not address information security threats, operational vulnerabilities…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Join Our Session on Tuesday at Gartner IAM Summit. Identity Is "The Force" Behind Sky's Digital Transformation

    scott c -quest-
    scott c -quest-

    At Sky, identity sits at the heart of our digital workplace. We’ve positioned it as one of the key drivers for our digital transformation.

    As you can hear in our session at the Gartner IAM Summit in Las Vegas, this effort is not our first investment…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Slaying the IAM Beast Is a Prerequisite for Successful Digital Transformation

    Rogier.Egberink
    Rogier.Egberink

    IAM programs should empower digital transformation, but organisations are at risk of being held back by mistakes from the past.

    Digital transformation is rapidly taking over boardroom agendas and giving businesses the tremendous challenge of reevaluating…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Looking Forward to the One Identity EMEA Partner Forum

    Looking Forward to the One Identity EMEA Partner Forum

    Andrew.Clarke
    Andrew.Clarke

    So a lot of people have asked what we intend to cover at the first One Identity EMEA Partner Forum.  Firstly, I would like to cover why we have named this a Forum.  Earlier this year I was captivated by a trip I took to Rome, where I was able to visit…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    Jeffrey Honeyman
    Jeffrey Honeyman

    I spend my days working with and for Federal Government agencies helping solve identity management challenges.  Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Be Sure to Visit One Identity at the Gartner IAM Summit in Vegas

    Be Sure to Visit One Identity at the Gartner IAM Summit in Vegas

    Bill.Evans
    Bill.Evans

    I wanted to remind you that One Identity will be on full display at the Gartner IAM Summit in Vegas from November 29 - December 1, 2016 at Caesar’s Palace. We have lots going on and it will be a good opportunity for you to see the products and even meet…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • #UnleashtheONE at Gartner IAM With Our Superhero Giveaway!

    Danielle.Vorce
    Danielle.Vorce

    WOP! POW! ZING! Stop by ONE IDENTITY Booth 200 to obtain a Super Power Medallion that will unlock your super power. Rock your medallion around your neck during expo hours and you can win a prize on the spot! Wait there is more! Bring your Super Power…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • One Identity EMEA Partner Forum – Recognition Award Winners 2016

    One Identity EMEA Partner Forum – Recognition Award Winners 2016

    Andrew.Clarke
    Andrew.Clarke

    During the recent One Identity EMEA Partner Forum – a highlight for everyone was a Celebration Dinner featuring our recognition award winners 2016.There were seven categories presented by Gyles Brandreth (former MP, broadcaster and author) and Ian Sutherland…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Save Time, Money and Accelerate the Integration of Cloud Apps With One Identity's Connect for Cloud

    Alex Binotto
    Alex Binotto

    As a product manager, I have the luxury of meeting customers from all around the globe and from all types of organizations. I’ve learned from these experiences that as the competitive landscape evolves, speed of adoption and adaption is paramount. Today…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Join Sponsor One Identity for March 9th Cyber Smoke

    Join Sponsor One Identity for March 9th Cyber Smoke

    Danielle.Vorce
    Danielle.Vorce

    Cyber Smoke is a premier after-hours networking event initially created for Industry and Government professionals to collaborate on cyber security initiatives at DHS.  It has since grown from the 6 original founders to well over 850 Industry and Government…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Security Pays … Just Ask Yahoo, What It Costs to Get It Wrong

    Security Pays … Just Ask Yahoo, What It Costs to Get It Wrong

    Bill.Evans
    Bill.Evans

    If there’s anyone that still doesn’t believe that an investment in security will pay dividends need only read today’s latest headline regarding the recent spate of breaches involving Yahoo.  Here’s a link to just one of the many articles…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Another successful One Identity User Conference has concluded

    Bill.Evans
    Bill.Evans

    We held our third One Identity user conference during the first week of April in Lisbon Portugal. This informative and interactive event is held twice a year with venues alternating between Europe and the North America. This time, it was Europe’s turn…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Tame Your SAP Environment/Modules - and All Your Enterprise Applications With One Governance Solution

    Tame Your SAP Environment/Modules - and All Your Enterprise Applications With One Governance Solution

    George Cerbone
    George Cerbone

    One of the more challenging problems of identity and access management (IAM) is dealing with the dizzying array of user entitlements. Answers to simple questions such as, ‘What resources does George have access to?’ or ‘Who has access to this resource…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Getting Identity and Access Management Right – Even If SAP Is Involved

    Getting Identity and Access Management Right – Even If SAP Is Involved

    Allison Main
    Allison Main


    DATE: Tuesday, May 23, 2017

    TIME: 4:00pm CEST, 10:00am ET, 7:00am PT

    Register for Webcast Now

    IT departments are struggling to make this access frictionless for users yet maintain compliance with corporate and government-imposed security and privacy…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content throughout Blogs
  • More
  • Cancel
>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center