• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • iam
  • identity manager
  • one identity
  • access control
  • access governance
  • Business agility
  • Compliance
  • data access governance
  • data security
  • Digital Transformation
  • dss
  • events
  • governance
  • HIPPA
  • IAM solutions
  • Identity and Access
  • Identity and Access Management
  • Identity Governance
  • identity mangaer
  • KuppingerCole
  • OneIdentityUNITE
  • Partners
  • PCI
  • Product Releases &amp
  • Security
  • Security Compliance
  • Thought Leadership
  • updates
  • One Identity has an early present to ensure that you don’t get on the naughty list.

    Kelly H
    Kelly H

    One of my favorite classic holiday movies is Elf. It has several great rules to live by including, “gum on the street is not free candy” and “a peep show is not getting to look at your presents early.”  But one of the one of the…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Upgrade to Awesome with Identity Manager - Part One

    Michael.Pierson
    Michael.Pierson

    Upgrade from Identity Manager 6.x - Synchronization

    Welcome to the first installment of our Upgrade to Awesome blog series, in it we'll take a look at the performance boost in version 7 connectors. This is important to understand as we prepare for the…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Winter is coming! But in Malta in November it still feels like summer!

    Andrew.Clarke
    Andrew.Clarke

    As we prepare for the One Identity UNITE EMEA Partner Conference on the beautiful island of Malta in southern Europe, we also celebrate One Identity’s successful first year as an independent company. To demonstrate that success and how we are preparing…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • And the survey says….”Good ol’ Fashioned IAM is Just Too Risky!”

    Todd Peterson
    Todd Peterson

     We’ve all been there – you’ve been doing something the same way for years and it seems to be going well. You’re in a groove and everything happens like clockwork. You know exactly what you’re doing and the results are predictable. You’re a well-oiled…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • One Identity UNITE Conferences – Don’t Miss Yours

    Bill.Evans
    Bill.Evans

    In the coming weeks, you will undoubtedly hear more from us about One Identity UNITE. UNITE is the new name for our growing series of events that bring together our user and partner communities to learn, collaborate and have fun. We will debut the UNITE…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Five Tips to Get Identity and Access Management Right – the First Time

    Five Tips to Get Identity and Access Management Right – the First Time

    Rogier.Egberink
    Rogier.Egberink

    As businesses look to move to the cloud and add value through digital transformation, data has moved beyond the perimeter. Organisations now need to offer secure anytime, anywhere access to customer and corporate data to deliver the best products and…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Swiss Post reduces administration workloads and tightens compliance procedures using a comprehensive identity and access management solution

    Allison Main
    Allison Main

    Identity and access management (IAM) is often a challenge for companies, with inconsistent and labour-intensive processes. For Swiss Post, the national postal service of Switzerland, IAM was a drain on resources because the organisation lacked an automated…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Tame Your SAP Environment/Modules - and All Your Enterprise Applications With One Governance Solution

    Tame Your SAP Environment/Modules - and All Your Enterprise Applications With One Governance Solution

    George Cerbone
    George Cerbone

    One of the more challenging problems of identity and access management (IAM) is dealing with the dizzying array of user entitlements. Answers to simple questions such as, ‘What resources does George have access to?’ or ‘Who has access to this resource…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Save Time, Money and Accelerate the Integration of Cloud Apps With One Identity's Connect for Cloud

    Alex Binotto
    Alex Binotto

    As a product manager, I have the luxury of meeting customers from all around the globe and from all types of organizations. I’ve learned from these experiences that as the competitive landscape evolves, speed of adoption and adaption is paramount. Today…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Agile IAM Architecture—How Does It Really Help My Business?

    Agile IAM Architecture—How Does It Really Help My Business?

    Allison Main
    Allison Main

    In today’s world, organizations need to have the right security policies and practices in place to prevent intrusions, protect data and ensure compliance with corporate policies and government regulations. When security enables an organization to make…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Surpass Payment Card Industry (PCI) Data Security Standard (DSS) Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts often compete with projects that address information security threats and vulnerabilities, and these efforts often lose out in the battle…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Payment Card Industry Data Security Standard

    Allison Main
    Allison Main

    While relatively a newcomer to the IT compliance scene, PCI DSS has been mandated by all members of the PCI Security Standards Council, including Visa International, MasterCard Worldwide, American Express, Discover Financial Services and JCB International…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Payment and Business Applications Security Features Are Insufficient

    Allison Main
    Allison Main

    Using the user, group and role-based management features of payment and business applications that accept cardholder data or sensitive authentication data is not enough to secure your data and ensure compliance with PCI DSS requirements.

    The set of system…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Digital Transformation: Why Security and Privacy Matter

    Allison Main
    Allison Main

    Digital Transformation of business is unstoppable. It affects virtually all industries. The IoT (Internet of Things) is just a part of this transformation. Organizations that do not adapt to the transformation are risking their very survival. Furthermore…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • The University of Maribor Covers Identity and Access Management Under One Umbrella for More Than 30,000 Users

    Allison Main
    Allison Main

    The University of Maribor is the second-largest university in Slovenia, with around 30,000 students enrolled across 17 facilities. The university’s goal is to improve its international standing, the quality of its education and research, and the efficiency…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    Todd Peterson
    Todd Peterson

    Let’s talk for a minute about security, or more specifically, let’s talk about the security of your IT systems, your users, and the data that they both use to further your business. Security is really important, after all if your stuff falls into the…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Join us for the One Identity User Conference

    Join us for the One Identity User Conference

    Allison Main
    Allison Main

    October 12-13, 2016 | New Orleans, LA

    Join us for One Identity User Conference October 12-13 in vibrant New Orleans. Come to this informative and educational event to collaborate, share and engage with the Identity Manager product management experts,…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Ensuring Compliance With HIPAA Security Rule Requirements

    Allison Main
    Allison Main

    Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content from anywhere
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center