• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • One Identity Safeguard
  • privileged access management
  • Active Directory
  • AD account lifecycle management
  • Azure Active Directory
  • Compromised Admin Credentials
  • Cyber Insurance
  • gartner
  • Gartner MQ for PAM
  • Hybrid AD Environments
  • Identity and Access Management
  • KuppingerCole
  • KuppingerCole Leadership Compass for PAM
  • Next generation PAM
  • Next generation Privileged Access Management
  • one identity
  • One Identity Global Survey
  • One Identity Safeguard for Privileged Analytics
  • One Identity Safeguard for Privileged Passwords
  • One Identity Safeguard for Privileged Sessions
  • PAM
  • pam best practices
  • PAM Challenge
  • privileged accounts
  • safeguard
  • Visionary Quadrant
  • Zero Trust Model
  • Invest in PAM to reduce your Cyber Insurance premiums

    Invest in PAM to reduce your Cyber Insurance premiums

    darren thomson
    darren thomson

    Cyber insurance has become a key component of risk management for many organizations. However, it can be difficult to keep up with cyber insurance requirements and avoid high premiums. One of the best ways to secure better cyber insurance coverage and…

    • over 1 year ago
    • Blogs
    • Privileged Access Management
  • One Identity: Overall Leader in 2021 KuppingerCole Leadership Compass for PAM

    One Identity: Overall Leader in 2021 KuppingerCole Leadership Compass for PAM

    Lara Bender
    Lara Bender

    One Identity has been named as an Overall Leader in the 2021 KuppingerCole Leadership Compass for Privileged Access Management. This recognition is based on our combined rating for product, innovation, and market.  

    We believe that our Overall Leader position…

    • over 3 years ago
    • Blogs
    • One Identity
  • The Many Faces of Privileged Access Management (PAM)

    The Many Faces of Privileged Access Management (PAM)

    Todd Peterson
    Todd Peterson

    Privileged access management (PAM) is one of the fastest growing areas of cybersecurity. As virtually every high-profile breach involves compromised privileged accounts and administrative access, it’s no surprise that securing those credentials and associated…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • Secure Privileged Access in a Hybrid Active Directory World

    Secure Privileged Access in a Hybrid Active Directory World

    Megan Pennie
    Megan Pennie

    The ubiquitous use of Microsoft Active Directory (AD) and Azure AD in 95 percent of the global Fortune 1000 companies make it the primary target of cyberattacks. Now, as more and more organizations integrate their Privileged Access Management (PAM) into…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Is ½ A Good Thing Or A Bad Thing? – Take the One Identity PAM Challenge

    Is ½ A Good Thing Or A Bad Thing? – Take the One Identity PAM Challenge

    Kelly H
    Kelly H

    Sometimes half isn’t great, like when my husband only pours me half a glass of wine or when I have to share half of my favorite dessert. But other times half is awesome, like only having to work a half day or realizing I am halfway through the work week…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • My Passion for Security can be Your Privileged Access Management Risk Mitigator

    My Passion for Security can be Your Privileged Access Management Risk Mitigator

    oriana weber
    oriana weber

    I started working with IT Security and Cybersecurity in 2001 and they became my passion. Since then, reading about the latest related topics is one of my habits. Because IT security and cybersecurity are such broad subject areas, I think one never stops…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • One Identity named a Visionary in the Gartner Magic Quadrant for Privileged Access Management

    One Identity named a Visionary in the Gartner Magic Quadrant for Privileged Access Management

    Kelly H
    Kelly H

    As organizations face an increasingly volatile cyber threat landscape in which hackers’ methods to penetrate corporate systems and data continue to evolve, effective privileged access management has never been more critical. At One Identity, we…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • Lessons learned from the Twitter breach and steps to avoid an internal data breach

    Lessons learned from the Twitter breach and steps to avoid an internal data breach

    Kelly H
    Kelly H

    The recent Twitter breach proves that it is necessary to secure access to social media accounts. It also verifies that the breach of social media accounts can have a financial impact in addition to an effect on your brand. The breach used social engineering…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • One Identity Named an Overall Market Leader in the Privileged Access Management

    One Identity Named an Overall Market Leader in the Privileged Access Management

    Kelly H
    Kelly H

    One Identity PAM portfolio was named an overall leader in the privileged access management market in KuppingerCole’s Leadership Compass report for the Privileged Access Management market. The report recognized our next-generation PAM solutions for…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • Five Reasons to Invest in Next-Generation PAM Technology

    Five Reasons to Invest in Next-Generation PAM Technology

    Kelly H
    Kelly H

    The original purpose of privileged access management (PAM) technology was password management and delegation, and a way to unify UNIX environments. Since that time, the world of privileged resources and data has greatly expanded and become even more critical…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • Global survey reveals privileged account management is living in the Stone Age

    Kelly H
    Kelly H

    Primitive practices leave organizations’ critical assets vulnerable to attacks                                                                 

    Too often, organizations take an approach to protecting their critical assets, such as customer data and intellectual property, that…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Privileged Access Doesn’t Have to Be All or Nothing

    Laureen.Smith
    Laureen.Smith

    One Identity Safeguard frees up processor manufacturer, Cavium to enter new markets securely

    The question of user access rights does not have to be one of all or nothing. As an IT leader at your organization, you can escape the binary choice of giving…

    • over 7 years ago
    • Blogs
    • One Identity
  • View related content from anywhere
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center