• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Identity Governance & Administration
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Identity Governance & Administration
  • All tags
  • one identity
  • access control
  • access governance
  • Compliance
  • Conference
  • customer stories
  • Customer Success
  • cybersecurity
  • Data Governance
  • Event
  • events
  • Gartner IAM Summit
  • governance
  • HIPAA compliance
  • HIPAA Security Rule requirements
  • iam
  • IAM solutions
  • Identity and Access
  • Identity and Access Management
  • Identity Governance
  • identity manager
  • identity mangaer
  • KuppingerCole
  • Security
  • Thought Leadership
  • Webcast
  • Save Time, Money and Accelerate the Integration of Cloud Apps With One Identity's Connect for Cloud

    Alex Binotto
    Alex Binotto

    As a product manager, I have the luxury of meeting customers from all around the globe and from all types of organizations. I’ve learned from these experiences that as the competitive landscape evolves, speed of adoption and adaption is paramount. Today…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • One Identity EMEA Partner Forum – Recognition Award Winners 2016

    One Identity EMEA Partner Forum – Recognition Award Winners 2016

    Andrew.Clarke
    Andrew.Clarke

    During the recent One Identity EMEA Partner Forum – a highlight for everyone was a Celebration Dinner featuring our recognition award winners 2016.There were seven categories presented by Gyles Brandreth (former MP, broadcaster and author) and Ian Sutherland…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • #UnleashtheONE at Gartner IAM With Our Superhero Giveaway!

    Danielle.Vorce
    Danielle.Vorce

    WOP! POW! ZING! Stop by ONE IDENTITY Booth 200 to obtain a Super Power Medallion that will unlock your super power. Rock your medallion around your neck during expo hours and you can win a prize on the spot! Wait there is more! Bring your Super Power…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Be Sure to Visit One Identity at the Gartner IAM Summit in Vegas

    Be Sure to Visit One Identity at the Gartner IAM Summit in Vegas

    Bill.Evans
    Bill.Evans

    I wanted to remind you that One Identity will be on full display at the Gartner IAM Summit in Vegas from November 29 - December 1, 2016 at Caesar’s Palace. We have lots going on and it will be a good opportunity for you to see the products and even meet…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    Jeffrey Honeyman
    Jeffrey Honeyman

    I spend my days working with and for Federal Government agencies helping solve identity management challenges.  Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Looking Forward to the One Identity EMEA Partner Forum

    Looking Forward to the One Identity EMEA Partner Forum

    Andrew.Clarke
    Andrew.Clarke

    So a lot of people have asked what we intend to cover at the first One Identity EMEA Partner Forum.  Firstly, I would like to cover why we have named this a Forum.  Earlier this year I was captivated by a trip I took to Rome, where I was able to visit…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Agile IAM Architecture—How Does It Really Help My Business?

    Agile IAM Architecture—How Does It Really Help My Business?

    Allison Main
    Allison Main

    In today’s world, organizations need to have the right security policies and practices in place to prevent intrusions, protect data and ensure compliance with corporate policies and government regulations. When security enables an organization to make…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Andy Vallila (SonicWALL and One Identity) and Brian Kelly, University CISO, to Discuss Cybersecurity Issues at the Campus Technology 2016 Conference in Boston

    Andy.Vallila
    Andy.Vallila

    Anna just started her freshman year at her dream school. Nervous and excited to start her college journey, she has many things on her mind, such as arriving at her 8:00 a.m. class on time, finding the perfect study group and acing English 101. As with…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • The University of Maribor Covers Identity and Access Management Under One Umbrella for More Than 30,000 Users

    Allison Main
    Allison Main

    The University of Maribor is the second-largest university in Slovenia, with around 30,000 students enrolled across 17 facilities. The university’s goal is to improve its international standing, the quality of its education and research, and the efficiency…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Big Decline in Federal Leaders Confidence in Agency Cybersecurity

    Jeffrey Honeyman
    Jeffrey Honeyman

    We commission several surveys of the IT marketplace every year. It’s one of the ways by which we keep up with broader technology trends so as to make sure that our security solutions meet your needs.

    With so many changes taking place in technology…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • So Now I Know What GDPR Is … What's Next?

    So Now I Know What GDPR Is … What's Next?

    Todd Peterson
    Todd Peterson

    There’s a growing buzz about this new regulation called GDPR (General Data Protection Regulation). It requires any organization that stores, processes, or transmits personal data on European Union citizens (even organizations outside of the EU) to undertake…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Get ready for May 2018 and the European Union’s General Data Protection Regulation (GDPR)

    Get ready for May 2018 and the European Union’s General Data Protection Regulation (GDPR)

    Todd Peterson
    Todd Peterson

    As if PCI, SOX, HIPAA, GLB, and all the other alphabet-soup regulations aren’t enough to bog down your security program, we now have a new one rearing its ugly head. The new regulation is the European Union General Data Protection Regulation – or GDPR…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    Todd Peterson
    Todd Peterson

    Let’s talk for a minute about security, or more specifically, let’s talk about the security of your IT systems, your users, and the data that they both use to further your business. Security is really important, after all if your stuff falls into the…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Join us for the One Identity User Conference

    Join us for the One Identity User Conference

    Allison Main
    Allison Main

    October 12-13, 2016 | New Orleans, LA

    Join us for One Identity User Conference October 12-13 in vibrant New Orleans. Come to this informative and educational event to collaborate, share and engage with the Identity Manager product management experts,…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Ensuring Compliance With HIPAA Security Rule Requirements

    Allison Main
    Allison Main

    Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content throughout Blogs
  • More
  • Cancel
<
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center