• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • PAM
  • privileged access management
  • admin account
  • Compliance
  • data security
  • Enterprise Attack Surface Expansion
  • gartner
  • How to Select a PAM Solution
  • iam
  • Identity and Access Management
  • insider threats
  • KuppingerCole
  • KuppingerCole Leadership Compass
  • Next generation PAM
  • Next generation Privileged Access Management
  • next-gen PAM
  • one identity
  • One Identity Global Survey
  • One Identity Safeguard
  • pam best practices
  • Privileged Access Management security risks
  • Privileged Account Management
  • privileged accounts
  • regulation
  • risk assessment
  • safeguard
  • Twitter breach
  • enterprise attack surface expansion lessons from 5 major breaches

    The dangers of enterprise attack surface expansion: Lessons from 5 major breaches

    Csaba Galffy
    Csaba Galffy

    Enterprise attack surface expansion has become a focal point for IT security teams. The relentless pursuit of securing every endpoint and countering new threats with the latest technology is not just costly; it's also unsustainable. Despite these…

    • 11 months ago
    • Blogs
    • One Identity
  • The benefits of Privileged Access Management for compliance and regulation

    The benefits of Privileged Access Management for compliance and regulation

    Jason Moody
    Jason Moody

    Privileged Access Management (PAM) is a crucial aspect of any organization's cybersecurity strategy, especially in industries that handle sensitive data, such as health care, finance and government. PAM involves implementing policies, procedures and tools…

    • over 1 year ago
    • Blogs
    • Privileged Access Management
  • Top tools and technologies for Privileged Access Management

    Top tools and technologies for Privileged Access Management

    Jason Moody
    Jason Moody

    Privileged Access Management (PAM) plays a vital role in organizational security by enabling control and monitoring of privileged accounts and resources. These accounts possess elevated access privileges, making them attractive targets for attackers…

    • over 1 year ago
    • Blogs
    • Privileged Access Management
  • How to conduct a Privileged Access Management risk assessment

    How to conduct a Privileged Access Management risk assessment

    Jason Moody
    Jason Moody

    In today's business landscape, organizations rely heavily on digital systems, applications, and webpages for their daily operations. However, with the increasing use of technology comes growing risks of unauthorized access to sensitive accounts and…

    • over 1 year ago
    • Blogs
    • Privileged Access Management
  • Best practices for implementing Privileged Access Management

    Best practices for implementing Privileged Access Management

    Alan Radford
    Alan Radford

    Privileged Access Management (PAM) is a critical component of any organization's cybersecurity strategy. Privileged accounts provide access to the most sensitive data and systems within an organization. As such, it's essential to manage them carefully…

    • over 1 year ago
    • Blogs
    • Privileged Access Management
  • The risks of not implementing Privileged Access Management in your organization

    The risks of not implementing Privileged Access Management in your organization

    Jason Moody
    Jason Moody

    Privileged Access Management (PAM) is a critical aspect of cybersecurity that helps organizations protect their sensitive data from unauthorized access. By controlling and monitoring access to privileged accounts, PAM solutions can prevent cyberattacks…

    • over 2 years ago
    • Blogs
    • Privileged Access Management
  • staying ahead of privileged access management security risks success strategies

    Staying ahead of Privileged Access Management security risks: Success strategies

    Bruce Esposito
    Bruce Esposito

    Privileged accounts are the root of most threat vectors. So, it’s critical to take proper precautions to prevent catastrophic breaches. However, it often takes extra time and effort to fully recognize and mitigate Privileged Access Management security…

    • over 2 years ago
    • Blogs
    • Privileged Access Management
  • One Identity: Overall Leader in 2021 KuppingerCole Leadership Compass for PAM

    One Identity: Overall Leader in 2021 KuppingerCole Leadership Compass for PAM

    Lara Bender
    Lara Bender

    One Identity has been named as an Overall Leader in the 2021 KuppingerCole Leadership Compass for Privileged Access Management. This recognition is based on our combined rating for product, innovation, and market.  

    We believe that our Overall Leader position…

    • over 3 years ago
    • Blogs
    • One Identity
  • one identity named privileged access management leader in gartner magic quadrant 2021

    One Identity named Privileged Access Management Leader in Gartner Magic Quadrant

    Joe Garber
    Joe Garber

    We’re thrilled to announce that, for the first time, One Identity has been named Leader in the 2021 edition of the Gartner Magic Quadrant for Privileged Access Management. This report reviews the current threat landscape and provides a detailed…

    • over 3 years ago
    • Blogs
    • Privileged Access Management
  • Gartner Magic Quadrant for Privileged Access Management 2021

    One Identity Can Help Your Customers Achieve Privileged Access Management Goals

    Andrew.Clarke
    Andrew.Clarke

    When it comes to boosting your customers’ cybersecurity, Gartner believes a great place to start is restricting privileged access within their Active Directory environments. They need a solid Privileged Access Management solution to accomplish this. How…

    • over 3 years ago
    • Blogs
    • One Identity
  • The Many Faces of Privileged Access Management (PAM)

    The Many Faces of Privileged Access Management (PAM)

    Todd Peterson
    Todd Peterson

    Privileged access management (PAM) is one of the fastest growing areas of cybersecurity. As virtually every high-profile breach involves compromised privileged accounts and administrative access, it’s no surprise that securing those credentials and associated…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • Is ½ A Good Thing Or A Bad Thing? – Take the One Identity PAM Challenge

    Is ½ A Good Thing Or A Bad Thing? – Take the One Identity PAM Challenge

    Kelly H
    Kelly H

    Sometimes half isn’t great, like when my husband only pours me half a glass of wine or when I have to share half of my favorite dessert. But other times half is awesome, like only having to work a half day or realizing I am halfway through the work week…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • Lessons learned from the Twitter breach and steps to avoid an internal data breach

    Lessons learned from the Twitter breach and steps to avoid an internal data breach

    Kelly H
    Kelly H

    The recent Twitter breach proves that it is necessary to secure access to social media accounts. It also verifies that the breach of social media accounts can have a financial impact in addition to an effect on your brand. The breach used social engineering…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • The Selection of a Privileged Access Management (PAM) Solution

    The Selection of a Privileged Access Management (PAM) Solution

    GuestBlogger
    GuestBlogger

    Safeguard is now amongst the top-rated PAM solutions on IT Central Station based on the input of by One Identity Safeguard users on IT Central Station (ITCS). We, at IT Central Station, recently published a paper that explores what goes into selecting…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • Five Reasons to Invest in Next-Generation PAM Technology

    Five Reasons to Invest in Next-Generation PAM Technology

    Kelly H
    Kelly H

    The original purpose of privileged access management (PAM) technology was password management and delegation, and a way to unify UNIX environments. Since that time, the world of privileged resources and data has greatly expanded and become even more critical…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • Global survey reveals privileged account management is living in the Stone Age

    Kelly H
    Kelly H

    Primitive practices leave organizations’ critical assets vulnerable to attacks                                                                 

    Too often, organizations take an approach to protecting their critical assets, such as customer data and intellectual property, that…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • View related content from anywhere
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center