• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • cybersecurity
  • Active Directory
  • Active Roles
  • campus
  • Compliance
  • Data Governance
  • Defense in Depth
  • Dell Security
  • Federal
  • FISA
  • iam
  • IAM solutions
  • Identity and Access Management
  • Identity Governance
  • identity security
  • IT security
  • jail
  • nsa
  • one identity
  • One Identity Safeguard
  • PCI DSS
  • security breach
  • sonicwall
  • Thought Leadership
  • Unified Identity Security Platform
  • Zero Trust
  • Understanding the business benefits of PAM: Beyond IT security

    Understanding the business benefits of PAM: Beyond IT security

    Jake McCabe
    Jake McCabe

    In today's fast-paced digital environment, organizations face a growing need to protect sensitive systems and data while maintaining operational efficiency and driving productivity.

    One Identity Safeguard, a comprehensive Privileged Access Management…

    • 2 months ago
    • Blogs
    • Privileged Access Management
  • Uber CISO

    How insights and unified identity security can keep CISOs out of jail

    rima pawar
    rima pawar

    The recent news around the trial of former CSO, Joe Sullivan, has raised quite a discussion about CISOs and their personal liability for breaches. Let’s be clear, the Sullivan verdict was not so much about the data breach responsibility as much as it…

    • over 2 years ago
    • Blogs
    • One Identity
  • Common Active Directory attacks

    Do you know how to stop the seven most common Active Directory attack methods?

    One Identity
    One Identity

    How do you protect your organization from Active Directory attacks?

    With over 95 percent of the Fortune 1000 companies relying on Microsoft Active Directory (AD) and Azure AD for authentication and single-sign-on support for their user populations, it…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Better Together Podcast Series - Microsoft Active Directory security and One Identity Active Roles best practices

    Fences, guard dogs, Zero Trust and Active Directory security

    Daniel.Conrad
    Daniel.Conrad

     
    The Zero Trust model introduces a fundamental shift to an organization’s security strategy. From the outset, a Zero Trust model assumes that attackers will get in rather than solely focusing on keeping attackers at bay outside of a perimeter. Don’t get…

    • over 2 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • What can we learn from the Okta breach?

    What can we learn from the Okta breach?

    One Identity
    One Identity

    The news recently broke: Okta was breached earlier this year and it potentially affected several hundred of their corporate customers. Though Okta is one of our competitors in the Identity and Access Management (IAM) world, we are not celebrating their…

    • over 3 years ago
    • Blogs
    • One Identity
  • Zero Trust vs Defense in Depth: Which is right for your org?

    Zero Trust vs Defense in Depth: Which strategy is right for your organization?

    Daniel.Conrad
    Daniel.Conrad

    With a digital transformation – as with the pioneers of the American west or Captain Kirk’s crew of the starship Enterprise – the mission is most important. The goal is to keep moving toward your objective as best you can while overcoming known and unknown…

    • over 3 years ago
    • Blogs
    • One Identity
  • zero trust takes center stage in new us white house guidance on cybersecurity

    Zero Trust Takes Center Stage in New U.S. White House Guidance on Cybersecurity

    Joe Garber
    Joe Garber

    On January 26, the U.S. White House Office of Management and Budget (OMB) issued a memorandum on advancing security measures to dramatically reduce the risk of successful cyberattacks against the federal government. The memo states that organizations…

    • over 3 years ago
    • Blogs
    • One Identity
  • What is an attack surface?

    What is an attack surface? A definition and best practices to reduce it

    One Identity
    One Identity

    What is an attack surface and what best practices can help to minimize it? Cyberattacks and data breaches are incredibly expensive and can cause customers to lose confidence in a business. It’s in every organization’s best interest to limit those risks…

    • over 3 years ago
    • Blogs
    • One Identity
  • One Identity's Global Survey 2021 on the state of Zero Trust; its deployment rate and common barriers to its implementation

    Global Survey Results: Zero Trust takes center stage again as cybersecurity risk increases

    Joe Garber
    Joe Garber

    Zero Trust – a cybersecurity concept focused on eliminating vulnerable permissions and unnecessary/excessive access to an organization’s critical assets – isn’t a new idea.  It was developed by Forrester Research more than a decade…

    • over 3 years ago
    • Blogs
    • One Identity
  • Join One Identity and KACE at Infosecurity Europe 2021

    Join One Identity and KACE at Infosecurity Europe 2021

    One Identity
    One Identity

    The average cost of a data breach by cybercriminals is $3.86 million, according to recent cybersecurity reports. Cyberattacks have only increased in frequency since the pandemic hit last year, with cyberattack records growing by 224% year-over-year and…

    • over 3 years ago
    • Blogs
    • One Identity
  • Three Key Takeaways from the U.S. Executive Order to Improve the Country’s Cybersecurity

    Three Key Takeaways from the U.S. Executive Order to Improve the Country’s Cybersecurity

    Joe Garber
    Joe Garber

    On May 12, U.S. President Joe Biden signed an executive order that is intended to help modernize the federal government’s cybersecurity practices.  This sweeping announcement follows last week’s Colonial Pipeline cyberattack, as well as other…

    • over 3 years ago
    • Blogs
    • One Identity
  • 10 Best Practices to Secure Active Directory – From Real Users of One Identity Active Roles

    10 Best Practices to Secure Active Directory – From Real Users of One Identity Active Roles

    Megan Pennie
    Megan Pennie

    Account Lifecycle Management programs have transformed since the pandemic, and we heard from IT thought leaders and real users that they must make great strides to increase Active Directory (AD) security and efficiency to handle the digital transformation…

    • over 3 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Three Ways to Improve Password Security and Self-service for Your End Users

    Three Ways to Improve Password Security and Self-service for Your End Users

    Megan Pennie
    Megan Pennie

    For enhanced password security, organizations need a simple, highly secure and efficient way for users to reset forgotten passwords and unlock accounts on their own. As an IT Leader, you must implement strong password policies and eliminate risk of data…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Achieve Zero Trust Even When Active Directory is in the Way

    Achieve Zero Trust Even When Active Directory is in the Way

    Daniel.Conrad
    Daniel.Conrad

    After working with Active Directory for longer than I care to confess, the term ‘Zero Trust’ has bubbled up just about everywhere I look. For years, I ignored it, mostly because it sounds too good to be true. I assumed – as with some industry buzzwords…

    • over 4 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • My Passion for Security can be Your Privileged Access Management Risk Mitigator

    My Passion for Security can be Your Privileged Access Management Risk Mitigator

    oriana weber
    oriana weber

    I started working with IT Security and Cybersecurity in 2001 and they became my passion. Since then, reading about the latest related topics is one of my habits. Because IT security and cybersecurity are such broad subject areas, I think one never stops…

    • over 4 years ago
    • Blogs
    • Privileged Access Management
  • Andy Vallila (SonicWALL and One Identity) and Brian Kelly, University CISO, to Discuss Cybersecurity Issues at the Campus Technology 2016 Conference in Boston

    Andy.Vallila
    Andy.Vallila

    Anna just started her freshman year at her dream school. Nervous and excited to start her college journey, she has many things on her mind, such as arriving at her 8:00 a.m. class on time, finding the perfect study group and acing English 101. As with…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Learn how to Get IAM Right at the Gartner Security and Risk Management Summit 2018

    Jackson Shaw
    Jackson Shaw

    Every year leading companies gather in National Harbor, MD to commiserate and learn on the state of IT security and risk management –sponsored by Gartner. And every year we, One Identity, sign up to participate as well. After all, nothing helps manage…

    • over 6 years ago
    • Blogs
    • One Identity
  • Security Pays … Just Ask Yahoo, What It Costs to Get It Wrong

    Security Pays … Just Ask Yahoo, What It Costs to Get It Wrong

    Bill.Evans
    Bill.Evans

    If there’s anyone that still doesn’t believe that an investment in security will pay dividends need only read today’s latest headline regarding the recent spate of breaches involving Yahoo.  Here’s a link to just one of the many articles…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Stop Security Breaches in Your AD Environment, But What About Kindergarten?

    Stop Security Breaches in Your AD Environment, But What About Kindergarten?

    Michelle.Fallon
    Michelle.Fallon

    Exhibit A:  Teacher gave me an overview of my child’s theory on school.

    My 5 year old started kindergarten at public school this week. It’s not a huge difference for her – she’s attended daycare, preschool, pre-k for the last few years.…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Protecting the Connected Home

    Protecting the Connected Home

    Andrew.Clarke
    Andrew.Clarke

    The connected home is conceived to improve our lifestyles and provide convenience. Along with that, we demand ease-of-use and something that we can plug-in and use. Welcome to the Internet of Things (IoT). Currently, there are no enforced security standards…

    • over 7 years ago
    • Blogs
    • Cloud
  • What Does It Mean to Be Regulated?

    What Does It Mean to Be Regulated?

    Bill.Evans
    Bill.Evans

    After the second terrorist attack in about two weeks in the UK, Prime Minister Theresa May claimed that the Internet needs regulating, and is a safe space for terrorists following on from the attack June 3rd. This got me thinking. Part of me feels this…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

    Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

    Daniel.Conrad
    Daniel.Conrad

    Continuing the push to secure the federal government networks, IT resources and data, the president has signed a new executive order that may give federal agencies an increased ability to make things happen.

    https://www.whitehouse.gov/the-press-office…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Join Sponsor One Identity for March 9th Cyber Smoke

    Join Sponsor One Identity for March 9th Cyber Smoke

    Danielle.Vorce
    Danielle.Vorce

    Cyber Smoke is a premier after-hours networking event initially created for Industry and Government professionals to collaborate on cyber security initiatives at DHS.  It has since grown from the 6 original founders to well over 850 Industry and Government…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

    Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

    Allison Main
    Allison Main

    Watch Now: OnDemand Webcast

    Learn IAM best practices to keep your systems compliant and secure.

    Your IT systems and process have to be compliant, and they have to be secure. That’s why, ideally, your security investments should also help with compliance…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Big Decline in Federal Leaders Confidence in Agency Cybersecurity

    Jeffrey Honeyman
    Jeffrey Honeyman

    We commission several surveys of the IT marketplace every year. It’s one of the ways by which we keep up with broader technology trends so as to make sure that our security solutions meet your needs.

    With so many changes taking place in technology…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content from anywhere
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center