• Products
    • View all products
    • Free trials
    • Identity Governance and Administration
      • Identity Manager
      • Identity Manager Data Governance
      • Starling Connect
    • AD Account Lifecycle Management
      • Active Roles
      • Authentication Services
      • Starling Connect
      • Password Manager
    • Privileged Access Management
      • One Identity Safeguard
      • Safeguard Authentication Services
      • Safeguard for Privileged Analytics
      • Safeguard for Privileged Passwords
      • Safeguard for Privileged Sessions
      • Safeguard for Sudo
    • Access control
      • Defender
      • Starling Two-Factor Authentication
      • Password Manager
    • syslog-ng Log Management
  • Integrations
    • Integrations Overview
    • Cloud Infrastructure
    • Access Management
      • Ping
    • Applications
      • SAP
    • Privileged Access Management
      • Blue Prism
      • HashiCorp
    • Data
    • Compliance
  • Solutions
    • All Solutions
    • Secure the organization
    • Drive operational efficiencies
    • Enable compliance and auditing
    • Support digital transformation
    • Enhance log management
  • Resources
    • Blogs
      • Blogs A to Z
      • AD-Centered IAM
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Customer Stories
    • Documents
    • Events
    • Webcasts
    • Technical Documentation
    • Videos
    • Whitepapers
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Identity Governance & Administration
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Identity Governance & Administration
  • All tags
  • identity manager
  • access control
  • Cloud
  • Compliance
  • Digital Transformation
  • Enterprise Provisioning
  • events
  • GDPR
  • governance
  • HIPAA Security Rule requirements
  • HIPPA
  • hybrid
  • iam
  • IAM solutions
  • Identity and Access
  • Identity and Access Management
  • Identity Governance
  • Identity Governance and Administration
  • identity mangaer
  • one identity
  • One identity manager
  • Privileged Account Management
  • SAP
  • Security Compliance
  • Starling Connect
  • Thought Leadership
  • application onboarding a critical need in identity governance

    Application Onboarding: A Critical Need in Identity Governance

    Ted Ernst
    Ted Ernst

    What is application onboarding? It is the deployment of software and the granting of user access with the proper permissions and roles defined. More importantly, it is putting that application under the control of an identity governance product or process…

    • 10 months ago
    • Blogs
    • Identity Governance & Administration
  • One Identity Named to IGA Leader in KuppingerCole Leadership Compass Report 2021

    One Identity Manager named an Overall Leader in IGA

    Allison Main
    Allison Main

    The KuppingerCole Leadership Compass 2021 Identity Governance and Administration (IGA) gives an overview and insights into the IGA market, providing you a compass to help you find the products that can meet the criteria necessary for successful IGA deployments…

    • over 1 year ago
    • Blogs
    • Identity Governance & Administration
  • One Identity Selected as 2020 American Cyber Awards Finalist

    One Identity Selected as 2020 American Cyber Awards Finalist

    Allison Main
    Allison Main

    Cloud-based applications provide convenient, flexible access to employees and customers. However, these applications also come with a slew of management and IT-security challenges. One Identity is committed to empowering organizations to extend its identity…

    • over 2 years ago
    • Blogs
    • Identity Governance & Administration
  • Worldwide conglomerate easily achieves IGA success with its digital transformation

    Worldwide conglomerate easily achieves IGA success with its digital transformation

    Allison Main
    Allison Main

    Otto Group IT serves the technology needs of companies around the world. Its clients span industries, including retail, finance and logistics. As the conglomerate undertook digital transformation initiatives, its legacy identity governance and administration…

    • over 3 years ago
    • Blogs
    • Identity Governance & Administration
  • Bank invests in faster, more secure IAM processes

    Bank invests in faster, more secure IAM processes

    Allison Main
    Allison Main

    It’s a fact of life for financial institutions – whether large or small – that managing identities and ensuring reliable, secure access to applications is a must. Grappling with internal- and external-user needs can quickly overwhelm the bank information…

    • over 3 years ago
    • Blogs
    • Identity Governance & Administration
  • IAM: a view from a partner’s POV

    One Identity
    One Identity

    This is a guest blog post by Brihteja.

    Brihteja is innovative IT company from Slovenia. Starting in 2011 with three persons only, the company has grown to sixteen employees. From the very beginning, knowing the importance of security, we are committed…

    • over 4 years ago
    • Blogs
    • Identity Governance & Administration
  • Starling Connect target system connectors at GA

    Allison Main
    Allison Main

    Alex Binotto is the Senior Product Manager for Starling Connect and has provided the list of connectors and target systems available now and what is coming soon. If you have a requested system, please email Alex.

    Target System

    Description

    Availab…

    • over 4 years ago
    • Blogs
    • Identity Governance & Administration
  • New Release unifies governance for on-premise, hybrid and cloud deployments

    Allison Main
    Allison Main

    Starling Connect is now GA

    Today, organization must launch new services and cloud applications quickly to stay competitive. As we all know, Identity and Access Management (IAM) is the platform to manage these identities through a standard set of processes…

    • over 4 years ago
    • Blogs
    • Identity Governance & Administration
  • B. Braun in Germany automates identity and access management for security and compliance while enabling digital transformation

    Allison Main
    Allison Main

    For B. Braun, one of the world´s leading providers of healthcare solutions based in Melsungen, Germany, the challenge was particularly acute. B. Braun needed to increase security, guarantee compliance, and control access to company data, especially…

    • over 4 years ago
    • Blogs
    • Identity Governance & Administration
  • Union Investment gets speed, flexibility and compliance from Identity Manager

    Allison Main
    Allison Main

    In the highly regulated investment industry, security and speed are critical.

    Union Investment has been in business for more than 60 years with over 320 billion in asset and management. 

    Union Investment needed a flexible identity and access management…

    • over 4 years ago
    • Blogs
    • Identity Governance & Administration
  • Tame Your SAP Environment/Modules - and All Your Enterprise Applications With One Governance Solution

    Tame Your SAP Environment/Modules - and All Your Enterprise Applications With One Governance Solution

    George Cerbone
    George Cerbone

    One of the more challenging problems of identity and access management (IAM) is dealing with the dizzying array of user entitlements. Answers to simple questions such as, ‘What resources does George have access to?’ or ‘Who has access to this resource…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    Todd Peterson
    Todd Peterson

    Let’s talk for a minute about security, or more specifically, let’s talk about the security of your IT systems, your users, and the data that they both use to further your business. Security is really important, after all if your stuff falls into the…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Ensuring Compliance With HIPAA Security Rule Requirements

    Allison Main
    Allison Main

    Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • Join us for the One Identity User Conference

    Join us for the One Identity User Conference

    Allison Main
    Allison Main

    October 12-13, 2016 | New Orleans, LA

    Join us for One Identity User Conference October 12-13 in vibrant New Orleans. Come to this informative and educational event to collaborate, share and engage with the Identity Manager product management experts,…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • Winter is coming! But in Malta in November it still feels like summer!

    Andrew.Clarke
    Andrew.Clarke

    As we prepare for the One Identity UNITE EMEA Partner Conference on the beautiful island of Malta in southern Europe, we also celebrate One Identity’s successful first year as an independent company. To demonstrate that success and how we are preparing…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • One Identity UNITE Conferences – Don’t Miss Yours

    Bill.Evans
    Bill.Evans

    In the coming weeks, you will undoubtedly hear more from us about One Identity UNITE. UNITE is the new name for our growing series of events that bring together our user and partner communities to learn, collaborate and have fun. We will debut the UNITE…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Commercial Vehicle Group drives compliance and safeguards data

    Allison Main
    Allison Main

    Commercial Vehicle Group cuts user access reviews from months to weeks and achieves regulatory compliance with automated identity and access management.

    For Commercial Vehicle Group, effective monitoring of IT user access is absolutely critical. The company…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Five Tips to Get Identity and Access Management Right – the First Time

    Five Tips to Get Identity and Access Management Right – the First Time

    Rogier.Egberink
    Rogier.Egberink

    As businesses look to move to the cloud and add value through digital transformation, data has moved beyond the perimeter. Organisations now need to offer secure anytime, anywhere access to customer and corporate data to deliver the best products and…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Getting Identity and Access Management Right – Even If SAP Is Involved

    Getting Identity and Access Management Right – Even If SAP Is Involved

    Allison Main
    Allison Main


    DATE: Tuesday, May 23, 2017

    TIME: 4:00pm CEST, 10:00am ET, 7:00am PT

    Register for Webcast Now

    IT departments are struggling to make this access frictionless for users yet maintain compliance with corporate and government-imposed security and privacy…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • One Identity User Conference in Lisbon, Portugal

    Allison Main
    Allison Main

    Join us for the One Identity User Conference

    April 5-6th, 2017| Lisbon, Portugal 

    Register Now

    Build on Your Identity Manager and Privileged Management Knowledge

    Attend this informative and educational event to learn, share and collaborate. Plus this event…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Save Time, Money and Accelerate the Integration of Cloud Apps With One Identity's Connect for Cloud

    Alex Binotto
    Alex Binotto

    As a product manager, I have the luxury of meeting customers from all around the globe and from all types of organizations. I’ve learned from these experiences that as the competitive landscape evolves, speed of adoption and adaption is paramount. Today…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Agile IAM Architecture—How Does It Really Help My Business?

    Agile IAM Architecture—How Does It Really Help My Business?

    Allison Main
    Allison Main

    In today’s world, organizations need to have the right security policies and practices in place to prevent intrusions, protect data and ensure compliance with corporate policies and government regulations. When security enables an organization to make…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content throughout Blogs
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2023 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center