• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
  • All tags
  • one identity
  • Thought Leadership
  • access control
  • access management
  • Cloud
  • Compliance
  • cybersecurity
  • Digital Transformation
  • Event
  • governance
  • HIPAA compliance
  • HIPAA Security Rule requirements
  • HIPPA
  • iam
  • IAM solutions
  • Identity and Access
  • Identity and Access Management
  • Identity as a Service
  • Identity Governance
  • Identity Governance and Access Management
  • identity manager
  • identity mangaer
  • KuppingerCole
  • Security
  • security breach
  • Security Compliance
  • user forum
  • Measuring Identity Governance – Five practical steps

    Paul Walker
    Paul Walker

    It’s a fair assumption that you’re not measuring your organisation’s identity access governance (IAG). And, if you are, it’s likely to be via an indirect measure, such as the risk of data breaches. But first, let’s begin by defining the functional pillars…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Protecting the Connected Home

    Protecting the Connected Home

    Andrew.Clarke
    Andrew.Clarke

    The connected home is conceived to improve our lifestyles and provide convenience. Along with that, we demand ease-of-use and something that we can plug-in and use. Welcome to the Internet of Things (IoT). Currently, there are no enforced security standards…

    • over 7 years ago
    • Blogs
    • Cloud
  • What Does It Mean to Be Regulated?

    What Does It Mean to Be Regulated?

    Bill.Evans
    Bill.Evans

    After the second terrorist attack in about two weeks in the UK, Prime Minister Theresa May claimed that the Internet needs regulating, and is a safe space for terrorists following on from the attack June 3rd. This got me thinking. Part of me feels this…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • One Identity Customer Nestlé Wins Prestigious 2017 KuppingerCole European Identity and Cloud Award

    Allison Main
    Allison Main

    Nestlé, the world’s leading nutrition, health and wellness company has been recognized by industry-leading analyst firm KuppingerCole as a winner in the “Best Identity and Access Management” category at this year’s European Identity and Cloud Conference…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • The future of One Identity — Introducing Digital Assistants – are Bots a Business Opportunity?

    The future of One Identity — Introducing Digital Assistants – are Bots a Business Opportunity?

    Alessandro Festa
    Alessandro Festa

    In my previous post, I’ve introduced the concept of Digital Assistants, or in a more classic definition I’ve introduced the concept of ‘bots’. I provided a simple definition of bot as: an autonomous program on a network (especially…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Jackson Shaw of One Identity talks Digital Transformation with Peter Boyle

    Jackson Shaw of One Identity talks Digital Transformation with Peter Boyle

    Danielle.Vorce
    Danielle.Vorce

    By Peter Boyle, Chief Technology Officer, Burning Tree

    Burning Tree were at the Gartner IAM Show on 6 March, meeting with information security professionals and keeping abreast of innovation in the sector. Peter Boyle, Burning Tree’s CTO caught up with…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Another successful One Identity User Conference has concluded

    Bill.Evans
    Bill.Evans

    We held our third One Identity user conference during the first week of April in Lisbon Portugal. This informative and interactive event is held twice a year with venues alternating between Europe and the North America. This time, it was Europe’s turn…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • The future of One Identity — Introducing Digital Assistants - What is a bot?

    The future of One Identity — Introducing Digital Assistants - What is a bot?

    Alessandro Festa
    Alessandro Festa

    Do you remember the old adage “on internet, nobody knows you’re a dog” by Peter Steiner? It was 1993 but curiously enough not much has changed. It’s still difficult, on internet as well as on your company network to tell the dogs from the people. You…

    • over 8 years ago
    • Blogs
    • Cloud
  • Security Pays … Just Ask Yahoo, What It Costs to Get It Wrong

    Security Pays … Just Ask Yahoo, What It Costs to Get It Wrong

    Bill.Evans
    Bill.Evans

    If there’s anyone that still doesn’t believe that an investment in security will pay dividends need only read today’s latest headline regarding the recent spate of breaches involving Yahoo.  Here’s a link to just one of the many articles…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • In conversation with a One Identity Partner: Core Technology Systems (UK)

    In conversation with a One Identity Partner: Core Technology Systems (UK)

    Andrew.Clarke
    Andrew.Clarke

    We recently had the opportunity to host an interview with Tim Eichmann, Head of Cloud & Infrastructure at Core Technology Systems (UK) Limited and One Identity.

    Core Technology Systems (UK) Limited help organisations large and small to achieve their…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    Jeffrey Honeyman
    Jeffrey Honeyman

    I spend my days working with and for Federal Government agencies helping solve identity management challenges.  Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • What's the Admin Password?

    What's the Admin Password?

    Jeffrey Honeyman
    Jeffrey Honeyman

    I’ve been there and asked that question. When I was a state IT manager, knowing that service account password was just part of keeping things running on a day to day basis. My team knew it and members of our security and server teams knew it.

    …
    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • So Now I Know What GDPR Is … What's Next?

    So Now I Know What GDPR Is … What's Next?

    Todd Peterson
    Todd Peterson

    There’s a growing buzz about this new regulation called GDPR (General Data Protection Regulation). It requires any organization that stores, processes, or transmits personal data on European Union citizens (even organizations outside of the EU) to undertake…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • The Cloud and the New Role of IT Departments

    The Cloud and the New Role of IT Departments

    Danielle.Vorce
    Danielle.Vorce

    “The Cloud” is changing business in many ways. This discussion is mostly targeting B2B and B2C applications and how cloud and SaaS offerings are affecting access control and security.

    Cloud and SaaS offerings affect businesses in the reduced…

    • over 8 years ago
    • Blogs
    • Active Directory Management (AD Mgmt)
  • When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    Todd Peterson
    Todd Peterson

    Let’s talk for a minute about security, or more specifically, let’s talk about the security of your IT systems, your users, and the data that they both use to further your business. Security is really important, after all if your stuff falls into the…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Ensuring Compliance With HIPAA Security Rule Requirements

    Allison Main
    Allison Main

    Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…

    • over 8 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content from anywhere
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2025 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center