Enterprise attack surface expansion has become a focal point for IT security teams. The relentless pursuit of securing every endpoint and countering new threats with the latest technology is not just costly; it's also unsustainable. Despite these…
Enterprise attack surface expansion has become a focal point for IT security teams. The relentless pursuit of securing every endpoint and countering new threats with the latest technology is not just costly; it's also unsustainable. Despite these…
As organizations are looking to streamline processes and enhance security, pursuing automation in identity and access management is a key area businesses can target. By pursuing automation in identity and access management, IT teams can free up time to…
The 2021 KuppingerCole Leadership Compass Identity as a Service (IDaaS) IGA focuses on the market segment of Identity as-a-Service (IDaaS) with a focus on IGA (Identity Governance and Administration, i.e., Identity Provisioning and Access Governance)…
Compromise (verb); /ˈkämprəˌmīz/
Definition No. 2. Accept standards that are lower than is desirable (Oxford Dictionaries)
You don’t need to compromise.
It seems when making the jump to the cloud, particularly with enterprise software, that…
Hannah Montana was right: you can have the best of both worlds. Though the late 2000s teen queen was singing about her secret double life as a high-flying pop star and a down-to-earth high school student, it turns out that that life goal now also applies…
Starling Connect:
Connectors: Oracle IDCS, and Bitbucket Users/Groups management connector will be available in this release. BaseCRM, and StatusPage connectors are currently in development, and will be available soon.
IAM programs should empower digital transformation, but organisations are at risk of being held back by mistakes from the past.
Digital transformation is rapidly taking over boardroom agendas and giving businesses the tremendous challenge of reevaluating…
It’s a fair assumption that you’re not measuring your organisation’s identity access governance (IAG). And, if you are, it’s likely to be via an indirect measure, such as the risk of data breaches. But first, let’s begin by defining the functional pillars…
https://www.youtube.com/watch?v=w96686f9Rug
As companies grow by acquisition and expand internationally, one of the natural by-products is a large and complex IT infrastructure.
Such was the case with Telefónica España and its multi-domain use of Active…
One of my favorite classic holiday movies is Elf. It has several great rules to live by including, “gum on the street is not free candy” and “a peep show is not getting to look at your presents early.” But one of the one of the…
Starling 2FA:
Role Management Enhances: The admin dashboard now permits administrators to modify roles of other 2FA collaborators. As the Starling ecosystem continues to expand this simplifies how administrators control access to existing and future Starling…
Identity-as-a-Service (IDaaS) Platform:
Go Live: One Identity is excited to announce the launch of our new Software as a Service platform! Organizations can continue to rely on One Identity's claim of offering solutions that are modular and integrated…
The challenges of identity and access management (IAM) – namely ensuring that the right people, have the right access, to the rights systems, in all the right ways – is difficult in most organizations, but even more so in local governments. With a wide…
Upgrade from Identity Manager 6.x - Synchronization
Welcome to the first installment of our Upgrade to Awesome blog series, in it we'll take a look at the performance boost in version 7 connectors. This is important to understand as we prepare for the…
Typically the weather in Malta in November is sunny and very warm (20C+), which is how the week started on Monday morning, and for those participants who arrived early, there was time to enjoy the scenery and sunshine, and although the temperature remained…
For many organizations, compliance with data security standards doesn’t seem to be getting easier. IT security compliance efforts are forever competing with information security projects, as well as operational vulnerabilities and business risks. All…
Last month, One Identity held its first One Identity UNITE conference in Newport Beach, California. Well, it was the first event that was actually branded UNITE. We’ve been having Customer Advisory Board (CAB) meetings, partner events and customer events…
AKA: who’s snooping at your most sensitive data
Remember Gladys Kravitz from the old Bewitched TV show? Unless you are old like me, you may not. Suffice it to say she is the epitome of the nosy neighbor –always snooping into other people’s business…
As we prepare for the One Identity UNITE EMEA Partner Conference on the beautiful island of Malta in southern Europe, we also celebrate One Identity’s successful first year as an independent company. To demonstrate that success and how we are preparing…
The user, group and role-based management features of certified Electronic Health Record (EHR) systems is not enough to ensure compliance with HIPAA Security Rule requirements. Other systems need to be considered, such as media storing and controls …
I have worked in the identity and access governance field for a while now. And while every customer is different and has different drivers in an absolute sense, just able all of the IAG projects I have had the privilege to work on can be broadly classified…
I’m quite pleased today to announce the latest innovation from the bright minds here are One Identity. Today we announced One Identity Starling Identity Analytics & Risk Intelligence. While the name is big, so is the value we expect our customers…