One of my favorite classic holiday movies is Elf. It has several great rules to live by including, “gum on the street is not free candy” and “a peep show is not getting to look at your presents early.” But one of the one of the…
One of my favorite classic holiday movies is Elf. It has several great rules to live by including, “gum on the street is not free candy” and “a peep show is not getting to look at your presents early.” But one of the one of the…
Upgrade from Identity Manager 6.x - Synchronization
Welcome to the first installment of our Upgrade to Awesome blog series, in it we'll take a look at the performance boost in version 7 connectors. This is important to understand as we prepare for the…
As we prepare for the One Identity UNITE EMEA Partner Conference on the beautiful island of Malta in southern Europe, we also celebrate One Identity’s successful first year as an independent company. To demonstrate that success and how we are preparing…
In the coming weeks, you will undoubtedly hear more from us about One Identity UNITE. UNITE is the new name for our growing series of events that bring together our user and partner communities to learn, collaborate and have fun. We will debut the UNITE…
As businesses look to move to the cloud and add value through digital transformation, data has moved beyond the perimeter. Organisations now need to offer secure anytime, anywhere access to customer and corporate data to deliver the best products and…
Identity and access management (IAM) is often a challenge for companies, with inconsistent and labour-intensive processes. For Swiss Post, the national postal service of Switzerland, IAM was a drain on resources because the organisation lacked an automated…
As a product manager, I have the luxury of meeting customers from all around the globe and from all types of organizations. I’ve learned from these experiences that as the competitive landscape evolves, speed of adoption and adaption is paramount. Today…
In today’s world, organizations need to have the right security policies and practices in place to prevent intrusions, protect data and ensure compliance with corporate policies and government regulations. When security enables an organization to make…
For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts often compete with projects that address information security threats and vulnerabilities, and these efforts often lose out in the battle…
While relatively a newcomer to the IT compliance scene, PCI DSS has been mandated by all members of the PCI Security Standards Council, including Visa International, MasterCard Worldwide, American Express, Discover Financial Services and JCB International…
Using the user, group and role-based management features of payment and business applications that accept cardholder data or sensitive authentication data is not enough to secure your data and ensure compliance with PCI DSS requirements.
The set of system…
Digital Transformation of business is unstoppable. It affects virtually all industries. The IoT (Internet of Things) is just a part of this transformation. Organizations that do not adapt to the transformation are risking their very survival. Furthermore…
Let’s talk for a minute about security, or more specifically, let’s talk about the security of your IT systems, your users, and the data that they both use to further your business. Security is really important, after all if your stuff falls into the…
For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…
October 12-13, 2016 | New Orleans, LA
Join us for One Identity User Conference October 12-13 in vibrant New Orleans. Come to this informative and educational event to collaborate, share and engage with the Identity Manager product management experts,…
Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…