The recent rise of ransomware, attacks on supply chains and increasing costliness of privacy regulations has made cyber insurance an important topic of discussion. But it can be tricky to keep up with cyber insurance requirements. One of…
The recent rise of ransomware, attacks on supply chains and increasing costliness of privacy regulations has made cyber insurance an important topic of discussion. But it can be tricky to keep up with cyber insurance requirements. One of…
https://www.youtube.com/watch?v=w96686f9Rug
As companies grow by acquisition and expand internationally, one of the natural by-products is a large and complex IT infrastructure.
Such was the case with Telefónica España and its multi-domain use of Active…
The challenges of identity and access management (IAM) – namely ensuring that the right people, have the right access, to the rights systems, in all the right ways – is difficult in most organizations, but even more so in local governments. With a wide…
In recent years, Malta has been a setting for many movies and TV series – the landscape and scenery providing a superb back-drop for many tales. One recent TV series that has filmed in Malta is the Game of Thrones.
In our industry, we are living…
Using the single, familiar Active Roles interface, there is no longer a need to be constantly switching between consoles, and writing complex scripts in an attempt to automate, because Active Roles does it for you.
Creation of a user, for example, can…
With version 7.1, the One Identity Active Roles solution has expanded its scope to cover both on-prem AD (as its always done) and Azure AD. Here’s an explanation of how it works.
The ADSI provider serves as the interface between the Active Roles…
Organizations are sprinting to Office 365. In fact, users will have to convert by Oct. 13, 2020 as support for Office 2020 ceases that day. By then, many organizations will be 100-percent cloud, but most are so heavily invested in legacy infrastructure…
The cloud isn’t coming — it’s here. And the quicker we all get on board, the better off we’ll be, right?!
Digital transformation, IT modernization projects and cost-control initiatives all point to the cloud as the easiest, most…
We recently had the opportunity to host an interview with Tim Eichmann, Head of Cloud & Infrastructure at Core Technology Systems (UK) Limited and One Identity.
Core Technology Systems (UK) Limited help organisations large and small to achieve their…
Provisioning.
Workflow.
Policies.
When these words come up people suddenly have a thought in their mind defining its meaning. Many Identity Management products sound the same, One identity even has multiple products that may use the same words to describe…
Most of us know what Two Factor Authentication is after all it has been with us for over 25 years. But while we have all been busy things have been changing slowly and steadily, especially when it comes to choosing whether to deploy hardware, software…
“The Cloud” is changing business in many ways. This discussion is mostly targeting B2B and B2C applications and how cloud and SaaS offerings are affecting access control and security.
Cloud and SaaS offerings affect businesses in the reduced…
Active Directory holds such a prominent position in the enterprise, that inadequate management and security of this universally accepted directory can be a major barrier to IAM success. For all its goodness, AD is woefully lacking in native management…
As this is my first blog post at One Identity, I’d like to say thank you for the warm welcome from all the partners, customers and internal colleagues who have reached out since I took on my new role as director of channel and alliances for North America…
Have you ever opened a software interface and didn’t have the slightest clue how to use it, or even worse, what it was for? The One Identity User Experience (UX) Team recognizes that the interfaces of our products are not immune to this. That is not acceptable…