The recent rise of ransomware, attacks on supply chains and increasing costliness of privacy regulations has made cyber insurance an important topic of discussion. But it can be tricky to keep up with cyber insurance requirements. One of…
The recent rise of ransomware, attacks on supply chains and increasing costliness of privacy regulations has made cyber insurance an important topic of discussion. But it can be tricky to keep up with cyber insurance requirements. One of…
Identity and Access Management (IAM) in most organizations is typically provided by Access Management, Privileged Access Management (PAM) and Identity Governance and Administration (IGA) solutions. Unfortunately, many of these solutions work independently…
Active Directory is often the backbone of organizational IT teams. From provisioning users, devices and recording permissions for access to network resources, Active Directory serves to manage user roles and make it easier for IT teams to maintain organizational…
Access Management (AM) ensures that the right people and job roles in your organization (identities) can access the tools they need to do their jobs. AM is critical to providing:
What is application onboarding? It is the deployment of software and the granting of user access with the proper permissions and roles defined. More importantly, it is putting that application under the control of an identity governance product or process…
On Oct 4, One Identity announced that it had acquired OneLogin, bringing these two storied entities together as one.
Analysts and thought leaders have predicted consolidation in the space for some time. CISOs certainly have incentive to minimize the number…
As the global pandemic prompted organizations worldwide to implement huge work-from-home programs, we reached out to offer help with securing the newly created remote-access channels with multifactor authentication (MFA) through our Defender product.…
What’s all this talk about Active Directory being obsolete?
You may have heard rumblings that Microsoft Active Directory – lovingly acronymed as ‘AD’ – is “becoming obsolete and should be replaced”. You may have also heard that “you should reduce…
The modern business world doesn’t go around without them: contractors, outsourced service providers and partners. Collectively known as third parties, they can be outside developers, business consultants, freelancers or partners who must connect to your…
It's October, so it's National Cybersecurity Awareness Month! And one of the main themes for this year's edition is multi-factor authentication: login protection by using more authentication factors than just the password. The second factor could be a…
The IT department of Radboud University (the Netherlands) manages 40,000 to 50,000 identities. With around 25,000, the school also has an academic hospital, with faculty and staff, along with researchers from all over the world, not to mention invited…
Read more about how the City of Bakersfield handles the increased use of mobile devices by the city’s police department and other field personnel.
Recently, I spent a few great days at Gartner Security Summit 2016. At security events like this,…
I spend my days working with and for Federal Government agencies helping solve identity management challenges. Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…
In recent years, Malta has been a setting for many movies and TV series – the landscape and scenery providing a superb back-drop for many tales. One recent TV series that has filmed in Malta is the Game of Thrones.
In our industry, we are living…
The challenges of identity and access management (IAM) – namely ensuring that the right people, have the right access, to the rights systems, in all the right ways – is difficult in most organizations, but even more so in local governments. With a wide…
https://www.youtube.com/watch?v=w96686f9Rug
As companies grow by acquisition and expand internationally, one of the natural by-products is a large and complex IT infrastructure.
Such was the case with Telefónica España and its multi-domain use of Active…
Most of us know what Two Factor Authentication is after all it has been with us for over 25 years. But while we have all been busy things have been changing slowly and steadily, especially when it comes to choosing whether to deploy hardware, software…
Provisioning.
Workflow.
Policies.
When these words come up people suddenly have a thought in their mind defining its meaning. Many Identity Management products sound the same, One identity even has multiple products that may use the same words to describe…
We recently had the opportunity to host an interview with Tim Eichmann, Head of Cloud & Infrastructure at Core Technology Systems (UK) Limited and One Identity.
Core Technology Systems (UK) Limited help organisations large and small to achieve their…
Organizations are sprinting to Office 365. In fact, users will have to convert by Oct. 13, 2020 as support for Office 2020 ceases that day. By then, many organizations will be 100-percent cloud, but most are so heavily invested in legacy infrastructure…
Using the single, familiar Active Roles interface, there is no longer a need to be constantly switching between consoles, and writing complex scripts in an attempt to automate, because Active Roles does it for you.
Creation of a user, for example, can…
With version 7.1, the One Identity Active Roles solution has expanded its scope to cover both on-prem AD (as its always done) and Azure AD. Here’s an explanation of how it works.
The ADSI provider serves as the interface between the Active Roles…