• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Identity Governance & Administration
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Identity Governance & Administration
  • All tags
  • Compliance
  • access control
  • case study
  • context-aware security
  • Enterprise Provisioning
  • GDPR
  • governance
  • HIPAA compliance
  • HIPAA Security Rule requirements
  • HIPPA
  • how to
  • hybrid
  • iam
  • Identity and Access Management
  • Identity Governance
  • identity manager
  • identity mangaer
  • IGA
  • internal IT controls
  • KuppingerCole Leadership Compass report
  • one identity
  • One identity manager
  • Security Compliance
  • Thought Leadership
  • User identities
  • user provisioning and de-provisioning
  • One Identity Manager named a Leader in KuppingerCole Leadership Compass for IGA

    One Identity Manager named a Leader in KuppingerCole Leadership Compass for IGA

    Allison Main
    Allison Main

    The Identity Governance and Administration market continues to evolve by integrating Identity Provisioning and Access Governance solutions with intelligent features. The KuppingerCole 2020 Identity Governance & Administration (IGA) Leadership Compass…

    • over 4 years ago
    • Blogs
    • Identity Governance & Administration
  • B. Braun in Germany automates identity and access management for security and compliance while enabling digital transformation

    Allison Main
    Allison Main

    For B. Braun, one of the world´s leading providers of healthcare solutions based in Melsungen, Germany, the challenge was particularly acute. B. Braun needed to increase security, guarantee compliance, and control access to company data, especially…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • Union Investment gets speed, flexibility and compliance from Identity Manager

    Allison Main
    Allison Main

    In the highly regulated investment industry, security and speed are critical.

    Union Investment has been in business for more than 60 years with over 320 billion in asset and management. 

    Union Investment needed a flexible identity and access management…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities and daily business…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    Todd Peterson
    Todd Peterson

    Let’s talk for a minute about security, or more specifically, let’s talk about the security of your IT systems, your users, and the data that they both use to further your business. Security is really important, after all if your stuff falls into the…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Ensuring Compliance With HIPAA Security Rule Requirements

    Allison Main
    Allison Main

    Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. First of all, IT security compliance efforts are forever competing for attention and funding with information-security projects, operational vulnerabilities…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Commercial Vehicle Group drives compliance and safeguards data

    Allison Main
    Allison Main

    Commercial Vehicle Group cuts user access reviews from months to weeks and achieves regulatory compliance with automated identity and access management.

    For Commercial Vehicle Group, effective monitoring of IT user access is absolutely critical. The company…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content throughout Blogs
  • More
  • Cancel
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2024 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center