• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • Identity and Access Management
  • Identity Governance
  • access control
  • access governance
  • Active Directory
  • Business agility
  • Compliance
  • Conference
  • Customer Success
  • cybersecurity
  • data access governance
  • data security
  • Digital Transformation
  • Event
  • events
  • Gartner IAM Summit
  • governance
  • iam
  • IAM solutions
  • Identity and Access
  • identity manager
  • KuppingerCole
  • one identity
  • Partners
  • privileged access management
  • Security
  • Thought Leadership
  • battling identity sprawl with unified identity security

    Battling Identity Sprawl with Unified Identity Security

    Joe Garber
    Joe Garber

    The traditional perimeter is eroding due to the mass adoption of cloud computing, the proliferation of SaaS applications, and a major rise in the number of identities — both human and non-human — that businesses are now required to secure. To learn more…

    • over 3 years ago
    • Blogs
    • Identity Governance & Administration
  • 2020 July Highlights

    Samuel Hazell
    Samuel Hazell

    Starling Connect:

    • Slack, New WebEx and Active Campaign: connectors now available
    • Enhanced features for Salesforce and SuccessFactors HR

    Starling 2FA:

    • Performance improvements 
    • over 4 years ago
    • Blogs
    • One Identity
  • One Identity EMEA Partner Awards 2020 -- WINNERS

    One Identity EMEA Partner Awards 2020 -- WINNERS

    Andrew.Clarke
    Andrew.Clarke

    One of the highlights of the year for One Identity is the Annual Partner Awards.  Usually, we coincide this with the EMEA UNITE Partner Conference, but this year since our event in Barcelona, Spain was postponed, we want to celebrate our 2020 award winners…

    • over 4 years ago
    • Blogs
    • One Identity
  • Upcoming webcast: Reduce the Burden Of Managing SAP With Enterprise Identity Management

    Upcoming webcast: Reduce the Burden Of Managing SAP With Enterprise Identity Management

    Allison Main
    Allison Main

    May 23, 2019

    1 PM ET 

    Register Now

    Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. IAM implementation is no longer about promoting efficiency during…

    • over 5 years ago
    • Blogs
    • One Identity
  • One Identity named a Leader in KuppingerCole Leadership Compass reports for both Privileged Access Management and Access Governance

    One Identity named a Leader in KuppingerCole Leadership Compass reports for both Privileged Access Management and Access Governance

    Kelly H
    Kelly H

    The KuppingerCole Leadership Compass reports provide detailed, independent reviews of the markets and key products for both the Privileged Access Management (PAM) and Access Governance (AG) market segments. One Identity is one of the only vendors to be…

    • over 6 years ago
    • Blogs
    • One Identity
  • Slaying the IAM Beast Is a Prerequisite for Successful Digital Transformation

    Rogier.Egberink
    Rogier.Egberink

    IAM programs should empower digital transformation, but organisations are at risk of being held back by mistakes from the past.

    Digital transformation is rapidly taking over boardroom agendas and giving businesses the tremendous challenge of reevaluating…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Measuring Identity Governance – Five practical steps

    Paul Walker
    Paul Walker

    It’s a fair assumption that you’re not measuring your organisation’s identity access governance (IAG). And, if you are, it’s likely to be via an indirect measure, such as the risk of data breaches. But first, let’s begin by defining the functional pillars…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • One Identity has an early present to ensure that you don’t get on the naughty list.

    Kelly H
    Kelly H

    One of my favorite classic holiday movies is Elf. It has several great rules to live by including, “gum on the street is not free candy” and “a peep show is not getting to look at your presents early.”  But one of the one of the…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Upgrade to Awesome with Identity Manager - Part One

    Michael.Pierson
    Michael.Pierson

    Upgrade from Identity Manager 6.x - Synchronization

    Welcome to the first installment of our Upgrade to Awesome blog series, in it we'll take a look at the performance boost in version 7 connectors. This is important to understand as we prepare for the…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Join Our Session on Tuesday at Gartner IAM Summit. Identity Is "The Force" Behind Sky's Digital Transformation

    scott c -quest-
    scott c -quest-

    At Sky, identity sits at the heart of our digital workplace. We’ve positioned it as one of the key drivers for our digital transformation.

    As you can hear in our session at the Gartner IAM Summit in Las Vegas, this effort is not our first investment…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • My Favorite Part of the Gartner IAM Summit

    Jackson Shaw
    Jackson Shaw

    Each year, we (One Identity) participate in the Gartner Identity and Access Management Summit. Of course we do, we’re an IAM vendor and would be foolish to skip this event. I love the valuable sessions and insight from Gartner, the interaction with other…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Winter is coming! But in Malta in November it still feels like summer!

    Andrew.Clarke
    Andrew.Clarke

    As we prepare for the One Identity UNITE EMEA Partner Conference on the beautiful island of Malta in southern Europe, we also celebrate One Identity’s successful first year as an independent company. To demonstrate that success and how we are preparing…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • ISO/IEC 27001 From an Auditor's Perspective

    ISO/IEC 27001 From an Auditor's Perspective

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn't seem to be getting easier. IT security compliance efforts are forever competing with projects that may or may not address information security threats, operational vulnerabilities…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • And the survey says….”Good ol’ Fashioned IAM is Just Too Risky!”

    Todd Peterson
    Todd Peterson

     We’ve all been there – you’ve been doing something the same way for years and it seems to be going well. You’re in a groove and everything happens like clockwork. You know exactly what you’re doing and the results are predictable. You’re a well-oiled…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Danielle.Vorce
    Danielle.Vorce

    The user, group and role-based management features of certified Electronic Health Record (EHR) systems is not enough to ensure compliance with HIPAA Security Rule requirements. Other systems need to be considered, such as media storing and controls …

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities and daily business…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • One Identity UNITE Conferences – Don’t Miss Yours

    Bill.Evans
    Bill.Evans

    In the coming weeks, you will undoubtedly hear more from us about One Identity UNITE. UNITE is the new name for our growing series of events that bring together our user and partner communities to learn, collaborate and have fun. We will debut the UNITE…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Commercial Vehicle Group drives compliance and safeguards data

    Allison Main
    Allison Main

    Commercial Vehicle Group cuts user access reviews from months to weeks and achieves regulatory compliance with automated identity and access management.

    For Commercial Vehicle Group, effective monitoring of IT user access is absolutely critical. The company…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Another Organization Gets IAM Right!

    Todd Peterson
    Todd Peterson

    Here at One Identity, we like to highlight organizations that figure it out and finally get IAM right. There are so many that struggle to achieve the security, automation, and transformation that IAM can deliver, that when someone pulls it off, we like…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Overcoming the Political Challenges of IAM for SAP-Centric Organizations to Create the Perfect World

    Alex Binotto
    Alex Binotto

    Striking a balance between security and business enablement is a constant challenge for any organization. Even for seemingly well-adjusted businesses, this search for the perfect world can be fraught with misunderstandings, miscommunication and political…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • What Does It Mean to Be Regulated?

    What Does It Mean to Be Regulated?

    Bill.Evans
    Bill.Evans

    After the second terrorist attack in about two weeks in the UK, Prime Minister Theresa May claimed that the Internet needs regulating, and is a safe space for terrorists following on from the attack June 3rd. This got me thinking. Part of me feels this…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Western Carolina University - One Identity Partner Blog

    Danielle.Vorce
    Danielle.Vorce

    By Guest Blogger, Victoria Schultz, Immersion Technology Services (One Identity Partner)

    Since it was established in 1889, Western Carolina University (WCU) has been bringing higher education and career opportunities to the western region of North Carolina…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

    Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

    Daniel.Conrad
    Daniel.Conrad

    Continuing the push to secure the federal government networks, IT resources and data, the president has signed a new executive order that may give federal agencies an increased ability to make things happen.

    https://www.whitehouse.gov/the-press-office…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Five Tips to Get Identity and Access Management Right – the First Time

    Five Tips to Get Identity and Access Management Right – the First Time

    Rogier.Egberink
    Rogier.Egberink

    As businesses look to move to the cloud and add value through digital transformation, data has moved beyond the perimeter. Organisations now need to offer secure anytime, anywhere access to customer and corporate data to deliver the best products and…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Swiss Post reduces administration workloads and tightens compliance procedures using a comprehensive identity and access management solution

    Allison Main
    Allison Main

    Identity and access management (IAM) is often a challenge for companies, with inconsistent and labour-intensive processes. For Swiss Post, the national postal service of Switzerland, IAM was a drain on resources because the organisation lacked an automated…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content from anywhere
  • More
  • Cancel
>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center