For the best web experience, please use IE10+, Chrome, Firefox, or Safari

The European Identity and Cloud Conference (EIC) 2018

We are sorry, the event "The European Identity and Cloud Conference (EIC) 2018" has already expired.

You may also be interested in.

On Demand Webcast

Privileged access management for hybrid cloud environments
Privileged access management for hybrid cloud environments

Moving to the cloud can offer some significant benefits, but ensuring security and achieving compliance in cloud based environments can pose challenges.

White Paper

Privilege Account Governance - Close the gap between privileged access and standard-user identities
Privilege Account Governance - Close the gap between privileged access and standard-user identities

Now, there’s no reason why you can’t have a complete view of all your identities and rights, from standard-user to privileged users. One Identity’s Privileged Account Governance (

Technical Brief

Get comprehensive and certified SAP integration with Identity Manager
Get comprehensive and certified SAP integration with Identity Manager

Since 2003, One Identity Manager has provided comprehensive certified integration with SAP products. Our identity and acc

On Demand Webcast

On-demand Webinar: Implementing an Identity and Access Management Program with Healthcare systems and Epic
On-demand Webinar: Implementing an Identity and Access Management Program with Healthcare systems and Epic

This on-demand webinar highlights the tight integration between New Hanover Regional Medical Center’s (NHRMC) Epic1 system and One Identity ID Manager.

E-book

The Journey to IAM Success in Healthcare
The Journey to IAM Success in Healthcare

Identity and access management is difficult enough, but then when you mix in regulations, such as HIPAA (and GDPR), it puts healthcare organizations at huge risks for non-compliance and penalties.

White Paper

Gartner has named One Identity a Leader in its February 2018 MQ for Identity Governance and Administration
Gartner has named One Identity a Leader in its February 2018 MQ for Identity Governance and Administration

One Identity is honored to be recognized as a Leader in the Gartner Magic Quadrant for 2018.

White Paper

Mapping Your Requirements to the NIST Cybersecurity Framework
Mapping Your Requirements to the NIST Cybersecurity Framework

To better understand how agencies can leverage the NIST Cybersecurity Framework to navigate the changing threat landscape, GovLoop partnered with Quest, a leader in helping build and manage modern, secure and more resilient IT architecture.

White Paper

Global Survey Full Results
Global Survey Full Results

Most IT security professionals are aware that their identity and access management (IAM) practices are substandard and know what to do to fix them -- but do not have the time nor resources to do anything about it.

Related products

Identity Manager
Identity Manager

Streamline user identity management, privilege access and security

Active Roles
Active Roles

Simplify the security of your Active Directory

Download Free Trial

Identity Manager – Data Governance Edition
Identity Manager – Data Governance Edition

Provide security and access rights to the appropriate users

One Identity Safeguard for Privileged Passwords
One Identity Safeguard for Privileged Passwords

Secure, control and automate the process of granting privileged access

One Identity Safeguard for Privileged Sessions
One Identity Safeguard for Privileged Sessions

Grant privileged access for a specific period or session with full recording and replay

Download Free Trial

Privilege Manager for Sudo
Privilege Manager for Sudo

Enhance Sudo 1.8.X with a central policy server, centralized sudo management and reporting

Download Free Trial

Privilege Manager for Unix
Privilege Manager for Unix

Define policies for root function access, as well as when and where this access is performed

Download Free Trial

Privileged Access Suite for Unix
Privileged Access Suite for Unix

Easily overcome security and admin challenges inherent in UNIX-based systems