• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • governance
  • access control
  • access governance
  • access management
  • case study
  • Cloud
  • cloud access manager
  • Compliance
  • Data Protection
  • Dell One Identity Manager
  • Digital Transformation
  • Enterprise Provisioning
  • GDPR
  • HIPPA
  • hybrid
  • iam
  • Identity and Access Management
  • Identity Governance
  • Identity Governance and Access Management
  • identity manager
  • MFA
  • News and Events
  • one identity
  • One identity manager
  • Security
  • Thought Leadership
  • One Identity Manager

    Identity Manager v9.0 is here and it rocks! Enhanced support and integration

    Ted Ernst
    Ted Ernst

    We are proud to announce Identity Manager 9.0. It’s a major leap forward in innovation and integration. See the below for key features that you asked for, including enhanced integration with platforms, such as Azure and SAP; as well as with One…

    • over 2 years ago
    • Blogs
    • Identity Governance & Administration
  • application onboarding a critical need in identity governance

    Application Onboarding: A Critical Need in Identity Governance

    Ted Ernst
    Ted Ernst

    What is application onboarding? It is the deployment of software and the granting of user access with the proper permissions and roles defined. More importantly, it is putting that application under the control of an identity governance product or process…

    • over 3 years ago
    • Blogs
    • Identity Governance & Administration
  • One Identity Manager named a Leader in KuppingerCole Leadership Compass for IGA

    One Identity Manager named a Leader in KuppingerCole Leadership Compass for IGA

    Allison Main
    Allison Main

    The Identity Governance and Administration market continues to evolve by integrating Identity Provisioning and Access Governance solutions with intelligent features. The KuppingerCole 2020 Identity Governance & Administration (IGA) Leadership Compass…

    • over 4 years ago
    • Blogs
    • Identity Governance & Administration
  • Worldwide conglomerate easily achieves IGA success with its digital transformation

    Worldwide conglomerate easily achieves IGA success with its digital transformation

    Allison Main
    Allison Main

    Otto Group IT serves the technology needs of companies around the world. Its clients span industries, including retail, finance and logistics. As the conglomerate undertook digital transformation initiatives, its legacy identity governance and administration…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • With Identity Manager, university's research data is protected

    Laureen.Smith
    Laureen.Smith

    The IT department of Radboud University (the Netherlands) manages 40,000 to 50,000 identities. With around 25,000, the school also has an academic hospital, with faculty and staff, along with researchers from all over the world, not to mention invited…

    • over 5 years ago
    • Blogs
    • Identity Governance & Administration
  • Starling Connect target system connectors at GA

    Allison Main
    Allison Main

    Alex Binotto is the Senior Product Manager for Starling Connect and has provided the list of connectors and target systems available now and what is coming soon. If you have a requested system, please email Alex.

    Target System

    Description

    Availab…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • New Release unifies governance for on-premise, hybrid and cloud deployments

    Allison Main
    Allison Main

    Starling Connect is now GA

    Today, organization must launch new services and cloud applications quickly to stay competitive. As we all know, Identity and Access Management (IAM) is the platform to manage these identities through a standard set of processes…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • B. Braun in Germany automates identity and access management for security and compliance while enabling digital transformation

    Allison Main
    Allison Main

    For B. Braun, one of the world´s leading providers of healthcare solutions based in Melsungen, Germany, the challenge was particularly acute. B. Braun needed to increase security, guarantee compliance, and control access to company data, especially…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • Union Investment gets speed, flexibility and compliance from Identity Manager

    Allison Main
    Allison Main

    In the highly regulated investment industry, security and speed are critical.

    Union Investment has been in business for more than 60 years with over 320 billion in asset and management. 

    Union Investment needed a flexible identity and access management…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • Digital Transformation Affects Every Organization

    Allison Main
    Allison Main

    A common misconception is that Digital Transformation is limited to certain industries, such as the ones supplying “smart homes” or “smart cities”. This is wrong. In fact, nearly every organization is impacted by Digital Transformation. Prominent examples…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • The University of Maribor Covers Identity and Access Management Under One Umbrella for More Than 30,000 Users

    Allison Main
    Allison Main

    The University of Maribor is the second-largest university in Slovenia, with around 30,000 students enrolled across 17 facilities. The university’s goal is to improve its international standing, the quality of its education and research, and the efficiency…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • AGL Energy Enhances Business Agility, Empowers Staff and Boosts Compliance

    Allison Main
    Allison Main

    “We have created a more agile business where personnel are empowered around access rights. We’ve made the working environment more flexible, giving people access to the applications they need, just when they need them, through Dell One Identity…

    • over 9 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Ensuring Compliance With HIPAA Security Rule Requirements

    Allison Main
    Allison Main

    Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Container Deployment Scenarios Alleviate Complex Deployments

    Alex Binotto
    Alex Binotto

    Digital transformation is an unstoppable force pushing nearly every organization to modify the way they operate. Seeing the competition gain an edge by embracing cloud-based resources and services is driving businesses to become more agile.

    To keep up…

    • over 7 years ago
    • Blogs
    • One Identity
  • Insurer in France protects against internal fraud with One Identity Manager

    Allison Main
    Allison Main

    Fraud is a multi-faceted threat that is of growing concern for all businesses today.

    Companies in the insurance industry are more at risk than most, given the fact they handle masses of highly sensitive financial data. In light of this, Natixis Assurances…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Hybrid, on-premises or cloud – View all identities across all systems

    Hybrid, on-premises or cloud – View all identities across all systems

    Allison Main
    Allison Main

    Today, more than ever, organizations must address the proliferation of cloud-based applications and digitally transform their business to stay ahead of the competition and meet customer’s demands. While cloud applications provide convenient and flexible…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • BHF Bank Overcomes Barriers to Access Management With One Identity

    Allison Main
    Allison Main

    BHF-BANK achieves 40 percent faster approval times for systems access and cuts administration time on identity management by 20 hours a week. 

    BHF-BANK, headquartered in Frankfurt and part of the French private banking group Oddo & Cie, has been catering…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    Jeffrey Honeyman
    Jeffrey Honeyman

    I spend my days working with and for Federal Government agencies helping solve identity management challenges.  Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

    Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

    Allison Main
    Allison Main

    Watch Now: OnDemand Webcast

    Learn IAM best practices to keep your systems compliant and secure.

    Your IT systems and process have to be compliant, and they have to be secure. That’s why, ideally, your security investments should also help with compliance…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • What's the Admin Password?

    What's the Admin Password?

    Jeffrey Honeyman
    Jeffrey Honeyman

    I’ve been there and asked that question. When I was a state IT manager, knowing that service account password was just part of keeping things running on a day to day basis. My team knew it and members of our security and server teams knew it.

    …
    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    Jeffrey Honeyman
    Jeffrey Honeyman

    I spend my days working with and for Federal Government agencies helping solve identity management challenges.  Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Get ready for May 2018 and the European Union’s General Data Protection Regulation (GDPR)

    Get ready for May 2018 and the European Union’s General Data Protection Regulation (GDPR)

    Todd Peterson
    Todd Peterson

    As if PCI, SOX, HIPAA, GLB, and all the other alphabet-soup regulations aren’t enough to bog down your security program, we now have a new one rearing its ugly head. The new regulation is the European Union General Data Protection Regulation – or GDPR…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • So Now I Know What GDPR Is … What's Next?

    So Now I Know What GDPR Is … What's Next?

    Todd Peterson
    Todd Peterson

    There’s a growing buzz about this new regulation called GDPR (General Data Protection Regulation). It requires any organization that stores, processes, or transmits personal data on European Union citizens (even organizations outside of the EU) to undertake…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • The Cloud and the New Role of IT Departments

    The Cloud and the New Role of IT Departments

    Danielle.Vorce
    Danielle.Vorce

    “The Cloud” is changing business in many ways. This discussion is mostly targeting B2B and B2C applications and how cloud and SaaS offerings are affecting access control and security.

    Cloud and SaaS offerings affect businesses in the reduced…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • View related content from anywhere
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center