• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • iam
  • access control
  • access governance
  • access management
  • Active Directory
  • Active Roles
  • Cloud
  • Compliance
  • Digital Transformation
  • events
  • governance
  • IAM solutions
  • Identity and Access
  • Identity and Access Management
  • Identity as a Service
  • Identity Governance
  • identity manager
  • KuppingerCole
  • one identity
  • Product Releases &amp
  • Security
  • starling
  • Support
  • Technical
  • Thought Leadership
  • updates
  • Agile IAM Architecture—How Does It Really Help My Business?

    Agile IAM Architecture—How Does It Really Help My Business?

    Allison Main
    Allison Main

    In today’s world, organizations need to have the right security policies and practices in place to prevent intrusions, protect data and ensure compliance with corporate policies and government regulations. When security enables an organization to make…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

    Understanding Identity and Access Management Compliance Requirements for PCI, HIPAA, SOX and ISO 27001

    Allison Main
    Allison Main

    Watch Now: OnDemand Webcast

    Learn IAM best practices to keep your systems compliant and secure.

    Your IT systems and process have to be compliant, and they have to be secure. That’s why, ideally, your security investments should also help with compliance…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Hardware, Software or Out-Of-Band What's the Latest Trend for Two-Factor Authentication?

    Hardware, Software or Out-Of-Band What's the Latest Trend for Two-Factor Authentication?

    David.Miles
    David.Miles

    Most of us know what Two Factor Authentication is after all it has been with us for over 25 years. But while we have all been busy things have been changing slowly and steadily, especially when it comes to choosing whether to deploy hardware, software…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Join us for the One Identity EMEA Partner Forum

    Join us for the One Identity EMEA Partner Forum

    Andrew.Clarke
    Andrew.Clarke

    In this current era, we all become reliant on our technology.   We can meet over the internet via phone or web conferences – putting video conferencing in all our hands.  It has its benefits saving us valuable time and money – but it is missing the…

    • over 8 years ago
    • Blogs
    • Cloud
  • How to Surpass Payment Card Industry (PCI) Data Security Standard (DSS) Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts often compete with projects that address information security threats and vulnerabilities, and these efforts often lose out in the battle…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Payment Card Industry Data Security Standard

    Allison Main
    Allison Main

    While relatively a newcomer to the IT compliance scene, PCI DSS has been mandated by all members of the PCI Security Standards Council, including Visa International, MasterCard Worldwide, American Express, Discover Financial Services and JCB International…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Payment and Business Applications Security Features Are Insufficient

    Allison Main
    Allison Main

    Using the user, group and role-based management features of payment and business applications that accept cardholder data or sensitive authentication data is not enough to secure your data and ensure compliance with PCI DSS requirements.

    The set of system…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Simplifying Identity Governance and Streamlining Compliance

    Allison Main
    Allison Main

    The controls used in the cardholder data environment (CDE) and the risks considered during the CDE scoping effort, such as all possible user access to account data (CHD and SAD), the DSS points them to consider whether the organization identified “all…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Bakersfield Police Dept Locks Down Remote Access with Defender

    Laureen.Smith
    Laureen.Smith

    Read more about how the City of Bakersfield handles the increased use of mobile devices by the city’s police department and other field personnel.

    Recently, I spent a few great days at Gartner Security Summit 2016. At security events like this,…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • Digital Transformation: Why Security and Privacy Matter

    Allison Main
    Allison Main

    Digital Transformation of business is unstoppable. It affects virtually all industries. The IoT (Internet of Things) is just a part of this transformation. Organizations that do not adapt to the transformation are risking their very survival. Furthermore…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Digital Transformation Affects Every Organization

    Allison Main
    Allison Main

    A common misconception is that Digital Transformation is limited to certain industries, such as the ones supplying “smart homes” or “smart cities”. This is wrong. In fact, nearly every organization is impacted by Digital Transformation. Prominent examples…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Digital Transformation Is More Than Just IoT

    Allison Main
    Allison Main

    Many people associate Digital Transformation with connecting things – the IoT (Internet of Things) as the quintessence of Digital Transformation. Connected things are part of the transformation, but it is about everything – business models, services…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Everything and Everyone Becomes Connected

    Allison Main
    Allison Main

    Digital Transformation adds billions of connected devices and things to what we already have in place. Therefore, we must learn to manage and thrive with the complex relationships of new organizations and their systems, devices, things and people

    It…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • The University of Maribor Covers Identity and Access Management Under One Umbrella for More Than 30,000 Users

    Allison Main
    Allison Main

    The University of Maribor is the second-largest university in Slovenia, with around 30,000 students enrolled across 17 facilities. The university’s goal is to improve its international standing, the quality of its education and research, and the efficiency…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • What's the Admin Password?

    What's the Admin Password?

    Jeffrey Honeyman
    Jeffrey Honeyman

    I’ve been there and asked that question. When I was a state IT manager, knowing that service account password was just part of keeping things running on a day to day basis. My team knew it and members of our security and server teams knew it.

    …
    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • So Now I Know What GDPR Is … What's Next?

    So Now I Know What GDPR Is … What's Next?

    Todd Peterson
    Todd Peterson

    There’s a growing buzz about this new regulation called GDPR (General Data Protection Regulation). It requires any organization that stores, processes, or transmits personal data on European Union citizens (even organizations outside of the EU) to undertake…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Get ready for May 2018 and the European Union’s General Data Protection Regulation (GDPR)

    Get ready for May 2018 and the European Union’s General Data Protection Regulation (GDPR)

    Todd Peterson
    Todd Peterson

    As if PCI, SOX, HIPAA, GLB, and all the other alphabet-soup regulations aren’t enough to bog down your security program, we now have a new one rearing its ugly head. The new regulation is the European Union General Data Protection Regulation – or GDPR…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • The Cloud and the New Role of IT Departments

    The Cloud and the New Role of IT Departments

    Danielle.Vorce
    Danielle.Vorce

    “The Cloud” is changing business in many ways. This discussion is mostly targeting B2B and B2C applications and how cloud and SaaS offerings are affecting access control and security.

    Cloud and SaaS offerings affect businesses in the reduced…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    Todd Peterson
    Todd Peterson

    Let’s talk for a minute about security, or more specifically, let’s talk about the security of your IT systems, your users, and the data that they both use to further your business. Security is really important, after all if your stuff falls into the…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • When it Comes to IAM, Active Directory Matters

    When it Comes to IAM, Active Directory Matters

    Todd Peterson
    Todd Peterson

    Active Directory holds such a prominent position in the enterprise, that inadequate management and security of this universally accepted directory can be a major barrier to IAM success. For all its goodness, AD is woefully lacking in native management…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Join us for the One Identity User Conference

    Join us for the One Identity User Conference

    Allison Main
    Allison Main

    October 12-13, 2016 | New Orleans, LA

    Join us for One Identity User Conference October 12-13 in vibrant New Orleans. Come to this informative and educational event to collaborate, share and engage with the Identity Manager product management experts,…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Ensuring Compliance With HIPAA Security Rule Requirements

    Allison Main
    Allison Main

    Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Get Ready for RSA 2018

    Todd Peterson
    Todd Peterson

    Will you be in San Francisco April 16-20? One Identity sure will. One of the highlights of our year is the RSA Security Conference and 2018 is no different. As always, we’ll have a lot going on at the show and would love for you to stop by if you’re going…

    • over 7 years ago
    • Blogs
    • One Identity
  • One Identity EMEA UNITE Partner Conference in Nice, France – 9 -12 April 2018

    Andrew.Clarke
    Andrew.Clarke

    As One Identity continues its journey to become an independent leading Identity and Access Management (IAM) solution provide, we are now UNITEing our customers and partner events into a unified, focused and collaborative event that spans four days – this…

    • over 7 years ago
    • Blogs
    • One Identity
  • View related content from anywhere
  • More
  • Cancel
<>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center