• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • iam
  • access control
  • access governance
  • access management
  • Active Directory
  • Active Roles
  • Cloud
  • Compliance
  • Digital Transformation
  • events
  • governance
  • IAM solutions
  • Identity and Access
  • Identity and Access Management
  • Identity as a Service
  • Identity Governance
  • identity manager
  • KuppingerCole
  • one identity
  • Product Releases &amp
  • Security
  • starling
  • Support
  • Technical
  • Thought Leadership
  • updates
  • One down, many, many more to go

    Bill.Evans
    Bill.Evans

    Last month, One Identity held its first One Identity UNITE conference in Newport Beach, California.  Well, it was the first event that was actually branded UNITE.  We’ve been having Customer Advisory Board (CAB) meetings, partner events and customer events…

    • over 7 years ago
    • Blogs
    • One Identity
  • The Gladys Kravitz Problem With IAM

    The Gladys Kravitz Problem With IAM

    Todd Peterson
    Todd Peterson

    AKA: who’s snooping at your most sensitive data

    Remember Gladys Kravitz from the old Bewitched TV show? Unless you are old like me, you may not. Suffice it to say she is the epitome of the nosy neighbor –always snooping into other people’s business…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Winter is coming! But in Malta in November it still feels like summer!

    Andrew.Clarke
    Andrew.Clarke

    As we prepare for the One Identity UNITE EMEA Partner Conference on the beautiful island of Malta in southern Europe, we also celebrate One Identity’s successful first year as an independent company. To demonstrate that success and how we are preparing…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • ISO/IEC 27001 From an Auditor's Perspective

    ISO/IEC 27001 From an Auditor's Perspective

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn't seem to be getting easier. IT security compliance efforts are forever competing with projects that may or may not address information security threats, operational vulnerabilities…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • And the survey says….”Good ol’ Fashioned IAM is Just Too Risky!”

    Todd Peterson
    Todd Peterson

     We’ve all been there – you’ve been doing something the same way for years and it seems to be going well. You’re in a groove and everything happens like clockwork. You know exactly what you’re doing and the results are predictable. You’re a well-oiled…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Danielle.Vorce
    Danielle.Vorce

    The user, group and role-based management features of certified Electronic Health Record (EHR) systems is not enough to ensure compliance with HIPAA Security Rule requirements. Other systems need to be considered, such as media storing and controls …

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Get Smarter About Risk With Identity Analytics and Join Our Randy Franklin Smith Webinar on September 19th!

    George Cerbone
    George Cerbone

    I have worked in the identity and access governance field for a while now.  And while every customer is different and has different drivers in an absolute sense, just able all of the IAG projects I have had the privilege to work on can be broadly classified…

    • over 7 years ago
    • Blogs
    • Cloud
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities and daily business…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Identity Analytics Isn't Your Father's IAM Solution

    Bill.Evans
    Bill.Evans

    I’m quite pleased today to announce the latest innovation from the bright minds here are One Identity.  Today we announced One Identity Starling Identity Analytics & Risk Intelligence.  While the name is big, so is the value we expect our customers…

    • over 7 years ago
    • Blogs
    • Cloud
  • One Identity UNITE Conferences – Don’t Miss Yours

    Bill.Evans
    Bill.Evans

    In the coming weeks, you will undoubtedly hear more from us about One Identity UNITE. UNITE is the new name for our growing series of events that bring together our user and partner communities to learn, collaborate and have fun. We will debut the UNITE…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • The One Identity Team Proudly Presents – One Identity Safeguard!

    Bill.Evans
    Bill.Evans

    Safeguard is our newest entrant into the world of privileged access management. It ships today and is available globally and in as many as 11 different languages. You can learn more about the product on our website.

    So how does one of the largest pure…

    • over 7 years ago
    • Blogs
    • Cloud
  • Another Organization Gets IAM Right!

    Todd Peterson
    Todd Peterson

    Here at One Identity, we like to highlight organizations that figure it out and finally get IAM right. There are so many that struggle to achieve the security, automation, and transformation that IAM can deliver, that when someone pulls it off, we like…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • 2017 July Highlights

    Jason F
    Jason F

    Identity Analytics and Risk Intelligence:

    Preview Mode:  Identity Analytics is moving out of preview mode shortly.  After the change the product will move into a release state.  A 30 day Trial will replace the previous preview option

    High Risk Account Views…

    • over 7 years ago
    • Blogs
    • Cloud
  • Protecting the Connected Home

    Protecting the Connected Home

    Andrew.Clarke
    Andrew.Clarke

    The connected home is conceived to improve our lifestyles and provide convenience. Along with that, we demand ease-of-use and something that we can plug-in and use. Welcome to the Internet of Things (IoT). Currently, there are no enforced security standards…

    • over 7 years ago
    • Blogs
    • Cloud
  • Overcoming the Political Challenges of IAM for SAP-Centric Organizations to Create the Perfect World

    Alex Binotto
    Alex Binotto

    Striking a balance between security and business enablement is a constant challenge for any organization. Even for seemingly well-adjusted businesses, this search for the perfect world can be fraught with misunderstandings, miscommunication and political…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • ‘Identity in Depth’ and the Evolution of Defense- Join Joe Campbell at Cloud Identity Summit

    ‘Identity in Depth’ and the Evolution of Defense- Join Joe Campbell at Cloud Identity Summit

    Danielle.Vorce
    Danielle.Vorce

    Join Joe Campbell, One Identity  Principal Security Advisor for his session"'Identity in Depth';The Evolution of Defense" on Monday June 19th at 4:15PM in Ballroom X. 

    Here is a sneak peak:

    Traditional ‘Defense in Depth’ IT security strategies…

    • over 7 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Another Gartner Security & Risk Summit has come to an end

    Bill.Evans
    Bill.Evans

    Another Gartner Security & Risk Summit has come to an end

    I just returned home from another wonderful Gartner event in the DC area from which there were many highlights.  Below are just a few of the key takeaways.

    On the identity and access management…

    • over 7 years ago
    • Blogs
    • Cloud
  • What Does It Mean to Be Regulated?

    What Does It Mean to Be Regulated?

    Bill.Evans
    Bill.Evans

    After the second terrorist attack in about two weeks in the UK, Prime Minister Theresa May claimed that the Internet needs regulating, and is a safe space for terrorists following on from the attack June 3rd. This got me thinking. Part of me feels this…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Western Carolina University - One Identity Partner Blog

    Danielle.Vorce
    Danielle.Vorce

    By Guest Blogger, Victoria Schultz, Immersion Technology Services (One Identity Partner)

    Since it was established in 1889, Western Carolina University (WCU) has been bringing higher education and career opportunities to the western region of North Carolina…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

    Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

    Daniel.Conrad
    Daniel.Conrad

    Continuing the push to secure the federal government networks, IT resources and data, the president has signed a new executive order that may give federal agencies an increased ability to make things happen.

    https://www.whitehouse.gov/the-press-office…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • 2017 June Highlights

    Jason F
    Jason F

    Starling Platform:

    Infrastructure:  All of these updates should remain hidden from view as the back-office is updated to support the upcoming launch of Identity Analytics.  Integration and testing is being conducted on multiple services like order processing…

    • over 7 years ago
    • Blogs
    • Cloud
  • Five Tips to Get Identity and Access Management Right – the First Time

    Five Tips to Get Identity and Access Management Right – the First Time

    Rogier.Egberink
    Rogier.Egberink

    As businesses look to move to the cloud and add value through digital transformation, data has moved beyond the perimeter. Organisations now need to offer secure anytime, anywhere access to customer and corporate data to deliver the best products and…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Swiss Post reduces administration workloads and tightens compliance procedures using a comprehensive identity and access management solution

    Allison Main
    Allison Main

    Identity and access management (IAM) is often a challenge for companies, with inconsistent and labour-intensive processes. For Swiss Post, the national postal service of Switzerland, IAM was a drain on resources because the organisation lacked an automated…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Tame Your SAP Environment/Modules - and All Your Enterprise Applications With One Governance Solution

    Tame Your SAP Environment/Modules - and All Your Enterprise Applications With One Governance Solution

    George Cerbone
    George Cerbone

    One of the more challenging problems of identity and access management (IAM) is dealing with the dizzying array of user entitlements. Answers to simple questions such as, ‘What resources does George have access to?’ or ‘Who has access to this resource…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • The future of One Identity — Introducing Digital Assistants – are Bots a Business Opportunity?

    The future of One Identity — Introducing Digital Assistants – are Bots a Business Opportunity?

    Alessandro Festa
    Alessandro Festa

    In my previous post, I’ve introduced the concept of Digital Assistants, or in a more classic definition I’ve introduced the concept of ‘bots’. I provided a simple definition of bot as: an autonomous program on a network (especially…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content from anywhere
  • More
  • Cancel
<>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center