• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • Identity Governance
  • access control
  • access governance
  • Active Directory
  • Business agility
  • Compliance
  • Conference
  • cybersecurity
  • data access governance
  • data security
  • Dell One Identity Manager
  • Digital Transformation
  • Event
  • events
  • governance
  • iam
  • IAM solutions
  • Identity and Access
  • Identity and Access Management
  • identity manager
  • KuppingerCole
  • one identity
  • Partners
  • Privileged Account Management
  • Security
  • Thought Leadership
  • Data breach vigilantes: CIAM and IGA for customer data protection

    Data breach vigilantes: CIAM and IGA for customer data protection

    Josh Karnes
    Josh Karnes

    In today's digital battleground, it seems like a week doesn’t go by where we don’t hear about some kind of data breach involving identity security. It's easy to become desensitized to the constant stream of identity security compr…

    • over 1 year ago
    • Blogs
    • Identity Governance & Administration
  • Identity risk management: What is it and how can you achieve it?

    Identity risk management: What is it and how can you achieve it?

    Ted Ernst
    Ted Ernst

    Risk. It’s more than just an infuriating board game from your childhood. And when identity risk is involved in your cybersecurity landscape – and it will be involved, since identity is one of the most easily accessible and most frequently attacked facets…

    • over 1 year ago
    • Blogs
    • Identity Governance & Administration
  • One Identity Manager version 9.2 has been released GA

    One Identity Manager version 9.2 has been released GA

    Ted Ernst
    Ted Ernst

    Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk and satisfies compliance by giving users access to data and applications they need – and only what they need – whether on-premises, hybrid…

    • over 1 year ago
    • Blogs
    • Identity Governance & Administration
  • Revolutionizing continuous governance

    Revolutionizing continuous governance

    Serkan Cetin
    Serkan Cetin

    In an era where data security and access management are crucial, organizations are constantly on the lookout for modern ways to enhance their governance strategies. What if you could not only manage user identities and access rights but also extend this…

    • over 1 year ago
    • Blogs
    • Identity Governance & Administration
  • Privileged Access Governance

    Close the security gap between privileged access and standard user identities

    One Identity
    One Identity

    The access control of privileged accounts has long been fulfilled by Privileged Access Management (PAM) technologies. However, traditional PAM technologies are often standalone solutions that are not integrated with Identity Governance and Administration…

    • over 2 years ago
    • Blogs
    • One Identity
  • Identity Governance Frameworks importance

    Identity Governance Framework: What it is, why it’s important

    Robert Byrne
    Robert Byrne

    The sheer number of users, identities, devices, data, applications and environments within enterprises makes managing user permissions and access while maintaining compliance a unique challenge. This increasingly complex organizational ecosystem makes…

    • over 2 years ago
    • Blogs
    • Identity Governance & Administration
  • battling identity sprawl with unified identity security

    Battling Identity Sprawl with Unified Identity Security

    Joe Garber
    Joe Garber

    The traditional perimeter is eroding due to the mass adoption of cloud computing, the proliferation of SaaS applications, and a major rise in the number of identities — both human and non-human — that businesses are now required to secure. To learn more…

    • over 3 years ago
    • Blogs
    • Identity Governance & Administration
  • 2020 July Highlights

    Samuel Hazell
    Samuel Hazell

    Starling Connect:

    • Slack, New WebEx and Active Campaign: connectors now available
    • Enhanced features for Salesforce and SuccessFactors HR

    Starling 2FA:

    • Performance improvements 
    • over 4 years ago
    • Blogs
    • One Identity
  • One Identity EMEA Partner Awards 2020 -- WINNERS

    One Identity EMEA Partner Awards 2020 -- WINNERS

    Andrew.Clarke
    Andrew.Clarke

    One of the highlights of the year for One Identity is the Annual Partner Awards.  Usually, we coincide this with the EMEA UNITE Partner Conference, but this year since our event in Barcelona, Spain was postponed, we want to celebrate our 2020 award winners…

    • over 4 years ago
    • Blogs
    • One Identity
  • Privileged Account Governance Delivers 360-Degree View of All Your Identities

    Privileged Account Governance Delivers 360-Degree View of All Your Identities

    Allison Main
    Allison Main

    The term ‘privileged access’ (sometimes referred to as ‘privilege account’) is a hot topic lately. Nearly every day, it seems that there is news of another data breach that is eventually tied to the misuse of or poorly protected privilege account credentials…

    • over 5 years ago
    • Blogs
    • Privileged Access Management
  • Can Pauline Find Productivity without AD-Centered Identity Management?

    Can Pauline Find Productivity without AD-Centered Identity Management?

    Todd Peterson
    Todd Peterson

    Which introductory experience do new hires to your organization get? Are they able to login on their first day and access all necessary resources to do their basic job? Or… are they temporarily assigned a left-over cubicle with no phone, computer or network…

    • over 5 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Starling Connect extends your identity administration and governance capabilities to the cloud

    Starling Connect extends your identity administration and governance capabilities to the cloud

    Todd Peterson
    Todd Peterson

    You already know the amazing capabilities of One Identity Active Roles and how it simplifies and centralizes provisioning and deprovisioning processes for your Active Directory and Azure Active Directory-controlled identities. You know that it provides…

    • over 5 years ago
    • Blogs
    • Cloud
  • With Identity Manager, university's research data is protected

    Laureen.Smith
    Laureen.Smith

    The IT department of Radboud University (the Netherlands) manages 40,000 to 50,000 identities. With around 25,000, the school also has an academic hospital, with faculty and staff, along with researchers from all over the world, not to mention invited…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Simplify the management of SAP-user accounts and their access rights

    Allison Main
    Allison Main

    How to manage SAP-User Accounts and Access Rights with Identity Manager. 

    Cengiz Tuztas, Senior Solutions Architect for Identity and Access Management, shows you how you can simplify the management of SAP-user accounts and their access rights. Native SAP…

    • over 5 years ago
    • Blogs
    • One Identity
  • Upcoming webcast: Reduce the Burden Of Managing SAP With Enterprise Identity Management

    Upcoming webcast: Reduce the Burden Of Managing SAP With Enterprise Identity Management

    Allison Main
    Allison Main

    May 23, 2019

    1 PM ET 

    Register Now

    Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. IAM implementation is no longer about promoting efficiency during…

    • over 5 years ago
    • Blogs
    • One Identity
  • One Identity named a Leader in KuppingerCole Leadership Compass reports for both Privileged Access Management and Access Governance

    One Identity named a Leader in KuppingerCole Leadership Compass reports for both Privileged Access Management and Access Governance

    Kelly H
    Kelly H

    The KuppingerCole Leadership Compass reports provide detailed, independent reviews of the markets and key products for both the Privileged Access Management (PAM) and Access Governance (AG) market segments. One Identity is one of the only vendors to be…

    • over 6 years ago
    • Blogs
    • One Identity
  • Join our April 19th Breakfast Event: Overcome native AD management tool limitations

    Join our April 19th Breakfast Event: Overcome native AD management tool limitations

    Danielle.Vorce
    Danielle.Vorce

    Join us April 19th for our breakfast event "Overcome Native AD Management Tool Limitations" at Privé Cafe at Marina at Keppel Bay in Singapore from 8am-11am GMT.

    Active Directory, simple and secure

    The capabilities of native Active…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Active Roles 7.1 – Automation for On-Prem AD and Azure AD

    Active Roles 7.1 – Automation for On-Prem AD and Azure AD

    David.Miles
    David.Miles

    Using the single, familiar Active Roles interface, there is no longer a need to be constantly switching between consoles, and writing complex scripts in an attempt to automate, because Active Roles does it for you. 

    Creation of a user, for example, can…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Show Us Your Best #GartnerSec Selfie!

    Danielle.Vorce
    Danielle.Vorce

    We are calling all Gartner Security & Risk Management Summit attendees to show us your most creative selfie in front of our #DeptofYes Wallscape that is located in our Security: Welcome to the Security Department of Yes Hospitality Suite in National…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Simplifying Identity Governance and Streamlining Compliance

    Allison Main
    Allison Main

    The controls used in the cardholder data environment (CDE) and the risks considered during the CDE scoping effort, such as all possible user access to account data (CHD and SAD), the DSS points them to consider whether the organization identified “all…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Global Survey: Digital Transformation Accelerated When IT Security Is Included in Planning

    mlfrance
    mlfrance

    The global Digital Transformation Security Survey, executed by Dimensional Research, queried 631 IT decision-makers about the impact of digital transformation on security teams. Survey responses indicated that businesses expect growth and have plans…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Andy Vallila (SonicWALL and One Identity) and Brian Kelly, University CISO, to Discuss Cybersecurity Issues at the Campus Technology 2016 Conference in Boston

    Andy.Vallila
    Andy.Vallila

    Anna just started her freshman year at her dream school. Nervous and excited to start her college journey, she has many things on her mind, such as arriving at her 8:00 a.m. class on time, finding the perfect study group and acing English 101. As with…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Big Decline in Federal Leaders Confidence in Agency Cybersecurity

    Jeffrey Honeyman
    Jeffrey Honeyman

    We commission several surveys of the IT marketplace every year. It’s one of the ways by which we keep up with broader technology trends so as to make sure that our security solutions meet your needs.

    With so many changes taking place in technology…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities and daily business…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • ISO/IEC 27001 From an Auditor's Perspective

    ISO/IEC 27001 From an Auditor's Perspective

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn't seem to be getting easier. IT security compliance efforts are forever competing with projects that may or may not address information security threats, operational vulnerabilities…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content from anywhere
  • More
  • Cancel
>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center