If you’ve spent any time in the identity security space lately, you’ve probably noticed the word “Fabric” being tossed around a lot. And if you’re like most people, you might be wondering: Is this just another marketing buzzword?…
If you’ve spent any time in the identity security space lately, you’ve probably noticed the word “Fabric” being tossed around a lot. And if you’re like most people, you might be wondering: Is this just another marketing buzzword?…
The management of non-human identities (NHI) presents unique challenges that many identity and access management professionals are still learning to navigate. Service accounts, provisioned accounts, and automated system credentials require governance…
Non-human identities. It seems like every technology conference that I’ve attended over the past year or so has had NHIs as a primary topic. And it’s no wonder. What have become powerful tools in the new world of hyper-automation, dynamic IT infrastructures…
If you are like me, a couple of years ago it felt like I suddenly woke up to a new concept in the world of IT: the non-human identity (NHI). But, wait… this sounds very familiar. Haven’t we had service accounts and machine identities for…
The SAP GRC (Governance, Risk Management and Compliance) Framework is a collection of enterprise software applications that help organizations control access and prevent fraud across the enterprise. At the same time, they…
Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk and satisfies compliance by giving users access to data and applications they need – and only what they need – whether on-premises, hybrid…
Does your company run SAP applications? If you do, you know how difficult it can be to manage identities. Most of the time, SAP applications are siloed and run completely independently of the rest your IT environment. This makes provisioning users across…
Vertical risk management and complete identity governance can only be achieved through the integration of critical platforms with other systems and applications in use and by either integrating existing point solutions or reducing their number altogether…
There’s a new cybersecurity challenge threatening the identity processes and systems of organizations worldwide: identity fatigue.
What is identity fatigue?
Identity fatigue is the result of IT professionals being overburdened by extensive security…
What is application onboarding? It is the deployment of software and the granting of user access with the proper permissions and roles defined. More importantly, it is putting that application under the control of an identity governance product or process…
The KuppingerCole Leadership Compass 2021 Identity Governance and Administration (IGA) gives an overview and insights into the IGA market, providing you a compass to help you find the products that can meet the criteria necessary for successful IGA deployments…
Cloud-based applications provide convenient, flexible access to employees and customers. However, these applications also come with a slew of management and IT-security challenges. One Identity is committed to empowering organizations to extend its identity…
Otto Group IT serves the technology needs of companies around the world. Its clients span industries, including retail, finance and logistics. As the conglomerate undertook digital transformation initiatives, its legacy identity governance and administration…
It’s a fact of life for financial institutions – whether large or small – that managing identities and ensuring reliable, secure access to applications is a must. Grappling with internal- and external-user needs can quickly overwhelm the bank information…
How to manage SAP-User Accounts and Access Rights with Identity Manager.
Cengiz Tuztas, Senior Solutions Architect for Identity and Access Management, shows you how you can simplify the management of SAP-user accounts and their access rights. Native SAP…
Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. IAM implementation is no longer about promoting efficiency during…
The KuppingerCole Leadership Compass reports provide detailed, independent reviews of the markets and key products for both the Privileged Access Management (PAM) and Access Governance (AG) market segments. One Identity is one of the only vendors to be…
This is a guest blog post by Brihteja.
Brihteja is innovative IT company from Slovenia. Starting in 2011 with three persons only, the company has grown to sixteen employees. From the very beginning, knowing the importance of security, we are committed…
Alex Binotto is the Senior Product Manager for Starling Connect and has provided the list of connectors and target systems available now and what is coming soon. If you have a requested system, please email Alex.
Target System
Description
Availab…
Starling Connect is now GA
Today, organization must launch new services and cloud applications quickly to stay competitive. As we all know, Identity and Access Management (IAM) is the platform to manage these identities through a standard set of processes…
For B. Braun, one of the world´s leading providers of healthcare solutions based in Melsungen, Germany, the challenge was particularly acute. B. Braun needed to increase security, guarantee compliance, and control access to company data, especially…
In the highly regulated investment industry, security and speed are critical.
Union Investment has been in business for more than 60 years with over 320 billion in asset and management.
Union Investment needed a flexible identity and access management…

We are calling all Gartner Security & Risk Management Summit attendees to show us your most creative selfie in front of our #DeptofYes Wallscape that is located in our Security: Welcome to the Security Department of Yes Hospitality Suite in National…

A common misconception is that Digital Transformation is limited to certain industries, such as the ones supplying “smart homes” or “smart cities”. This is wrong. In fact, nearly every organization is impacted by Digital Transformation. Prominent examples…