• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Identity Governance & Administration
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Identity Governance & Administration
Related Tags
  • access governance
  • Compliance
  • governance
  • iam
  • Identity and Access
  • Identity and Access Management
  • Identity Governance
  • identity manager
  • one identity
  • Thought Leadership
Options
  • Subscribe by email
  • Posts RSS
  • More
  • Cancel
  • Tags
  • Subscribe by email
  • More
  • Cancel
  • Data breach vigilantes: CIAM and IGA for customer data protection

    Data breach vigilantes: CIAM and IGA for customer data protection

    Josh Karnes
    Josh Karnes
    Learn how CIAM (Customer Identity and Access Management) and IGA (Identity Governance & Administration) can make a powerful security duo to protect customer identities and data.
    • 7 May 2024
  • Identity risk management: What is it and how can you achieve it?

    Identity risk management: What is it and how can you achieve it?

    Ted Ernst
    Ted Ernst
    Identity risk is involved in your cybersecurity landscape – learn how identity risk management works and how you can achieve it.
    • 30 Apr 2024
  • SAP GRC (Governance, Risk Management and Compliance) Framework and Identity Manager

    SAP GRC (Governance, Risk Management and Compliance) Framework and Identity Manager

    Cengiz.Tuztas
    Cengiz.Tuztas
    What is the SAP GRC Framework? The SAP GRC (Governance, Risk Management and Compliance) Framework is a collection of enterprise software applications that help organizations control access and prevent fraud across the enterprise. At the same time, th…
    • 9 Jan 2024
  • One Identity Manager version 9.2 has been released GA

    One Identity Manager version 9.2 has been released GA

    Ted Ernst
    Ted Ernst
    One Identity Manager version 9.2 has been released GA, with new features that enhance user experience and security. Read more about this release.
    • 17 Nov 2023
  • Revolutionizing continuous governance

    Revolutionizing continuous governance

    Serkan Cetin
    Serkan Cetin
    KuppingerCole's Leadership Compass is not just a validation of Identity Manager's capabilities – it’s an endorsement of the future of continuous governance.
    • 15 Sep 2023
  • Unlock the power of identity governance with cloud-based IGA

    Unlock the power of identity governance with cloud-based IGA

    Allison Main
    Allison Main
    Cloud-based IGA solutions often incorporate analytics capabilities. Organizations can gain valuable insights into identity-related patterns, detect anomalies and proactively address security risks.
    • 16 Aug 2023
  • Making Zero Trust a Reality

    Making Zero Trust a Reality

    Ted Ernst
    Ted Ernst
    Learn how to overcome common Zero Trust challenges, unlearn common misconceptions and discover how to make it a reality for your organization.
    • 23 Jun 2023
  • How to manage SAP user accounts and access rights with Identity Manager

    How to manage SAP user accounts and access rights with Identity Manager

    Cengiz.Tuztas
    Cengiz.Tuztas
    Learn about the benefits Identity Manager offers SAP users
    • 22 Jun 2023
  • Continuous governance provides a comprehensive strategy across your entire organization

    Continuous governance provides a comprehensive strategy across your entire organization

    Ted Ernst
    Ted Ernst
    Extend your identity governance beyond identities and entitlements to secure privileged access, applications, cloud infrastructure and critical data.
    • 15 Jun 2023
  • Holistic SAP governance through enterprise environment integration

    Holistic SAP governance through enterprise environment integration

    Reto.Bachmann
    Reto.Bachmann
    Learn how Identity Manager can help integrate your identity platform with SAP to achieve complete identity governance.
    • 14 Jun 2023
  • Identity fatigue – the security challenge that threatens identity processes and systems

    Identity fatigue – the security challenge that threatens identity processes and systems

    Serkan Cetin
    Serkan Cetin
    Learn about identity fatigue, what risks it poses to your organization and how you can overcome it with Identity Governance & Administration.
    • 16 May 2023
  •  integrated Access Management and IGA in behavior driven govnernance

    Breaking Down Silos: Why integrated Access Management and IGA is crucial for modern organizations

    Josh Karnes
    Josh Karnes
    Learn all the cybersecurity benefits your organization can gain by integrating your Access Management and IGA solutions, and how behavior driven governance helps with that.
    • 12 Apr 2023
<>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center