For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Cloud Infrastructure Entitlement Management (CIEM)

One Identity addresses Cloud Infrastructure Entitlement Management (CIEM) at the intersection of IGA and PAM. It leverages IGA capabilities to enhance governance of cloud-platform authorizations and deliver crystal clear visibility of cloud-infrastructure objects. Our CIEM offering taps into powerful PAM functionality to secure, control, monitor, analyze and govern privileged access across multiple environments and platforms. You can extend governance to cloud-infrastructure objects and manage privileged access to cloud objects. Plus, you can ensure that your organization has the right permissions mix and control for your workforce, and you can reduce your attack surface to become truly cybersecurity resilient.
CIEM: Identity Manager

Identity Manager

One Identity Manager enables you to govern access to on-premises, cloud and hybrid resources from request through fulfillment for users and data, as well as:

  • Reduce risk by ensuring users have only the access they need
  • Deploy an identity centric Zero Trust model
  • Satisfy audit and compliance initiatives with attestation/recertification policies
  • Put access decisions where they belong — in the hands of the business
CIEM: Safeguard


Simplify your PAM processes across all our environments with the One Identity Safeguard suite.

  • Control and streamline privileged access
  • Protect critical assets and resources
  • Identify and stop risky behaviors and unusual events
  • Mitigate the potential damage of a security breach
CIEM: Starling Connect

Starling Connect

Extend your identity security to cloud apps to help centralize your IGA strategy.

  • Connect to a growing list of popular SaaS and cloud apps
  • Consolidate access control across your on-prem, SaaS and cloud resources
  • Quickly deploy cloud applications
  • Streamline user provisioning and de-provisioning processes


On Demand Webcast

CIEM A sneak peek

Cloud Infrastructure Entitlement Management is not really a new topic, but has become one of the top areas where customers shou...
On Demand Webcast

IGA Product Highlight: CIEM

Cloud Infrastructure Entitlement Management (CIEM) is fast becoming a must have for managing privileges, as cloud providers hav...

eBook: Strategies for successfully managing privileged accounts

One of the most important aspects of an identity security program is the management and governance of the accounts belonging to...

Extend identity governance to secure your enterprise

Extend identity governance far beyond identities and entitlements to protect/ secure privileged access, applications, cloud in...

Modernize your identity security strategy

No one can afford to wait for the future to arrive before making critical identity security enhancements.
Case Study

WM Gruppe fortifies server admin accounts while saving hours of work using Safeguard

With regulatory requirements increasing, WM Gruppe wanted to reinforce privileged account management (PAM) to counter cybercrim...
White Paper

Stop breaches with privileged access security

With the complexity of today’s IT landscape and the critical role that privileged access security plays in protecting what’s es...
White Paper

Six Steps to Achieving Data Access Governance

Organizations know that controlling access to data is vital: security breaches, mistakes and leaks of sensitive enterprise data...