Enterprise attack surface expansion has become a focal point for IT security teams. The relentless pursuit of securing every endpoint and countering new threats with the latest technology is not just costly; it's also unsustainable. Despite these…
Enterprise attack surface expansion has become a focal point for IT security teams. The relentless pursuit of securing every endpoint and countering new threats with the latest technology is not just costly; it's also unsustainable. Despite these…
Join us at The One Identity Resilience User and Partner Conference in Barcelona, 29 November – 1 December 2022.
If you haven’t heard, registration is open. The One Identity team has created an agenda that brings the most value to our partners, customers…
Why should you attend One Identity Resilience User and Partner Conference? Because our beautiful world has changed and is continuing to change. In the last two years or so, few aspects of our lives have remained the same. We need to move forward from…
IT is all Greek to me. What a great pun for those that aren’t IT savvy. Not everyone can be the expert in everything – even within the IT industry. It’s not uncommon to run across colleagues (looking at you, marketing friends) that, shall we say, have…
Why do you need a unified identity security strategy? Well, because the daily work life of a CISO is difficult enough already, with the constant threat of digital break ins, the worry about lapses in security procedures, budget concerns, board committees…
One of the highlights of the year for One Identity is the Annual Partner Awards. Usually, we coincide this with the EMEA UNITE Partner Conference, but this year since our event in Barcelona, Spain was postponed, we want to celebrate our 2020 award winners…
The KuppingerCole Leadership Compass reports provide detailed, independent reviews of the markets and key products for both the Privileged Access Management (PAM) and Access Governance (AG) market segments. One Identity is one of the only vendors to be…
AKA: who’s snooping at your most sensitive data
Remember Gladys Kravitz from the old Bewitched TV show? Unless you are old like me, you may not. Suffice it to say she is the epitome of the nosy neighbor –always snooping into other people’s business…
When we think of privileged or shared accounts, Facebook and Twitter don’t typically come to mind. However, as several organizations in the entertainment industry learned last week, those accounts are very much at risk and when compromised can be detrimental…
The expense to unlock a user’s account goes far beyond billable helpdesk hours but also lost the productivity of everyone impacted by the lack of user access – including the user, the user’s internal and external clients – and even the Helpdesk representative…
As a kid I always loved having my mom read me books by Dr. Suess, There’s a Wocket in My Pocket and The Sneetches being a few of my favorites. Now that I have children, I realize what challenging these books can be to read aloud. But if you can get through…
For many organizations, compliance with data security standards doesn't seem to be getting easier. With the myriad of regulations, it’s not easy to understand what each one of them are actually requiring you to do.
You can get ahead of the game…
What a year it has been, thanks to you, our partners. Since becoming an independent brand, One Identity has seen incredible growth in our Partner Circle Program. That growth is not just in the volume of sales (always important) by partner members – a…
As this is my first blog post at One Identity, I’d like to say thank you for the warm welcome from all the partners, customers and internal colleagues who have reached out since I took on my new role as director of channel and alliances for North America…
One Identity Safeguard frees up processor manufacturer, Cavium to enter new markets securely
The question of user access rights does not have to be one of all or nothing. As an IT leader at your organization, you can escape the binary choice of giving…
Have you ever opened a software interface and didn’t have the slightest clue how to use it, or even worse, what it was for? The One Identity User Experience (UX) Team recognizes that the interfaces of our products are not immune to this. That is not acceptable…