For the best web experience, please use IE11+, Chrome, Firefox, or Safari

POSTPONED UNTIL FURTHER NOTICE Identity Management: solving the problem in Higher Education

We are sorry, the event "POSTPONED UNTIL FURTHER NOTICE Identity Management: solving the problem in Higher Education" has already expired.

You may also be interested in.

Online Event

Streamline Application Onboarding
Streamline Application Onboarding

Onboarding an application into an IGA solution so it can be governed by your organization can be a difficult task. See how One Identity is approaching this problem with a quick look at the new Application Governance feature in Identity Manager.Presenter: Robert Kraczek, Global IAM Strategist, One Identity

Technical Brief

Okta (as Identity Provider) and Identity Manager (Enterprise Identity Governance) integration
Okta (as Identity Provider) and Identity Manager (Enterprise Identity Governance) integration

Okta (as Identity Provider) and Identity Manager (Enterprise Identity Governance) integration

Infographic

ESG Infographic
ESG Infographic

ESG validates how Quest Recovery Manager simplifies, accelerates and automates backup and recovery of Microsoft Active Directory.

Online Event

Approaches to modernizing your IGA program – is there only one path?
Approaches to modernizing your IGA program – is there only one path?

An Identity Governance and Administration (IGA) program is at the heart of enterprise Identity and Access Management (IAM) strategies. But there’s a problem: Your organization has probably incorporated new IT infrastructure and business applications since your IGA program was originally developed. In order for your IGA program to support your broad range of IT infrastructure and business applications, it will need an upgrade. In this 30-minute session, we will discuss approa

Technical Brief

SafeNet Trusted Access and One Identity Manager (IGA) + One Identity Manager On Demand (IDaaS)
SafeNet Trusted Access and One Identity Manager (IGA) + One Identity Manager On Demand (IDaaS)

Organizations need to ensure that the right users gain access to the right resources, at the right time and for the right reasons. As corporate assets get more distributed and the workforce gets more mobile, enabling access and governing access rights

White Paper

Zero Trust and IT Security – A Global Survey of Security Stakeholders
Zero Trust and IT Security – A Global Survey of Security Stakeholders

Download a copy of the Global IT Security survey results to learn more details about the state of Zero Trust.

White Paper

Executive Summary | Exploring the current state of Zero Trust – awareness, adoption, and barriers to success
Executive Summary | Exploring the current state of Zero Trust – awareness, adoption, and barriers to success

One Identity recently commissioned a survey of 1,000 IT security professionals to see how the Zero Trust model is being implemented, what barriers prevent adoption and how its importance is perceived

E-book

eBook: Cyber resilience in the era of identity sprawl
eBook: Cyber resilience in the era of identity sprawl

This new eBook highlights ways your organization can bolster your defenses against modern attack methods

Related products

Identity Manager
Identity Manager

Govern and secure user access to data and enterprise apps to reduce risk and satisfy compliance