• Products
    • View all products
    • Free trials
  • Solutions
    • All Solutions
    • All Integrations
  • Resources
    • All Resources
    • Learning Hub
  • Trials
  • Support
    • Support Home
    • By Product
      • All Products
      • Active Roles
      • Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM Appliance
    • Contact Support
      • Overview
      • Customer Service
      • Licensing Assistance
      • Renewal Assistance
      • Technical Support
    • Download Software
    • Knowledge Base
    • My Account
      • My Products
      • My Service Requests
      • My Licenses
      • My Groups
      • My Profile
    • Policies & Procedures
    • Professional Services
    • Technical Documentation
    • One Identity University
    • User Forums
    • Video Tutorials
  • Partners
    • Overview
    • Partner Circle Log In
    • Become a Partner
    • Find a Partner
    • Partner Community
  • Communities
    • Home
    • Blogs
      • Blogs A to Z
      • One Identity Community
      • AD Account Lifecycle Management
      • Cloud
      • Identity Governance & Administration
      • Privileged Access Management
      • syslog-ng Community
    • Forums
      • All Product Forums
      • Active Roles
      • Identity Manager
      • Password Manager
      • Safeguard
      • Unix Access Management
    • Social Networks
      • Facebook
      • LinkedIn
      • Twitter
      • YouTube
One Identity Community
One Identity Community
  • Site
  • User
  • Site
  • Search
  • User
Blogs
Blogs
Identity Governance & Administration
  • AD Account Lifecycle Management
  • Cloud
  • Identity Governance & Administration
  • Privileged Access Management
  • One Identity
  • Life at One Identity
  • More
  • Cancel
  • New
Identity Governance & Administration
  • All tags
  • Identity Governance
  • access governance
  • Compliance
  • Conference
  • customer stories
  • Customer Success
  • cybersecurity
  • Event
  • events
  • governance
  • HIPAA compliance
  • HIPAA Security Rule requirements
  • iam
  • IAM solutions
  • Identity and Access
  • Identity and Access Management
  • Identity Governance and Access Management
  • identity manager
  • KuppingerCole
  • one identity
  • One identity manager
  • Partners
  • SAP
  • Security
  • Thought Leadership
  • Webcast
  • Data breach vigilantes: CIAM and IGA for customer data protection

    Data breach vigilantes: CIAM and IGA for customer data protection

    Josh Karnes
    Josh Karnes

    In today's digital battleground, it seems like a week doesn’t go by where we don’t hear about some kind of data breach involving identity security. It's easy to become desensitized to the constant stream of identity security compr…

    • 2 months ago
    • Blogs
    • Identity Governance & Administration
  • Identity risk management: What is it and how can you achieve it?

    Identity risk management: What is it and how can you achieve it?

    Ted Ernst
    Ted Ernst

    Risk. It’s more than just an infuriating board game from your childhood. And when identity risk is involved in your cybersecurity landscape – and it will be involved, since identity is one of the most easily accessible and most frequently attacked facets…

    • 2 months ago
    • Blogs
    • Identity Governance & Administration
  • One Identity Manager version 9.2 has been released GA

    One Identity Manager version 9.2 has been released GA

    Ted Ernst
    Ted Ernst

    Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk and satisfies compliance by giving users access to data and applications they need – and only what they need – whether on-premises, hybrid…

    • 8 months ago
    • Blogs
    • Identity Governance & Administration
  • Revolutionizing continuous governance

    Revolutionizing continuous governance

    Serkan Cetin
    Serkan Cetin

    In an era where data security and access management are crucial, organizations are constantly on the lookout for modern ways to enhance their governance strategies. What if you could not only manage user identities and access rights but also extend this…

    • 10 months ago
    • Blogs
    • Identity Governance & Administration
  • Identity Governance Frameworks importance

    Identity Governance Framework: What it is, why it’s important

    Robert Byrne
    Robert Byrne

    The sheer number of users, identities, devices, data, applications and environments within enterprises makes managing user permissions and access while maintaining compliance a unique challenge. This increasingly complex organizational ecosystem makes…

    • over 1 year ago
    • Blogs
    • Identity Governance & Administration
  • battling identity sprawl with unified identity security

    Battling Identity Sprawl with Unified Identity Security

    Joe Garber
    Joe Garber

    The traditional perimeter is eroding due to the mass adoption of cloud computing, the proliferation of SaaS applications, and a major rise in the number of identities — both human and non-human — that businesses are now required to secure. To learn more…

    • over 2 years ago
    • Blogs
    • Identity Governance & Administration
  • With Identity Manager, university's research data is protected

    Laureen.Smith
    Laureen.Smith

    The IT department of Radboud University (the Netherlands) manages 40,000 to 50,000 identities. With around 25,000, the school also has an academic hospital, with faculty and staff, along with researchers from all over the world, not to mention invited…

    • over 4 years ago
    • Blogs
    • Identity Governance & Administration
  • How to Achieve HIPAA Security Compliance

    How to Achieve HIPAA Security Compliance

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts are forever competing with projects to address ever-pressing information security threats, operational vulnerabilities and daily business…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • ISO/IEC 27001 From an Auditor's Perspective

    ISO/IEC 27001 From an Auditor's Perspective

    Allison Main
    Allison Main

    For many organizations, compliance with data security standards doesn't seem to be getting easier. IT security compliance efforts are forever competing with projects that may or may not address information security threats, operational vulnerabilities…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • Join Our Session on Tuesday at Gartner IAM Summit. Identity Is "The Force" Behind Sky's Digital Transformation

    scott c -quest-
    scott c -quest-

    At Sky, identity sits at the heart of our digital workplace. We’ve positioned it as one of the key drivers for our digital transformation.

    As you can hear in our session at the Gartner IAM Summit in Las Vegas, this effort is not our first investment…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • Slaying the IAM Beast Is a Prerequisite for Successful Digital Transformation

    Rogier.Egberink
    Rogier.Egberink

    IAM programs should empower digital transformation, but organisations are at risk of being held back by mistakes from the past.

    Digital transformation is rapidly taking over boardroom agendas and giving businesses the tremendous challenge of reevaluating…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • Looking Forward to the One Identity EMEA Partner Forum

    Looking Forward to the One Identity EMEA Partner Forum

    Andrew.Clarke
    Andrew.Clarke

    So a lot of people have asked what we intend to cover at the first One Identity EMEA Partner Forum.  Firstly, I would like to cover why we have named this a Forum.  Earlier this year I was captivated by a trip I took to Rome, where I was able to visit…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    How Is the PIV Effort Really Going? It's More Than a Desktop Challenge

    Jeffrey Honeyman
    Jeffrey Honeyman

    I spend my days working with and for Federal Government agencies helping solve identity management challenges.  Always (now) with an eye toward security, I feel their pain in balancing the functionality needs of their enterprises with the security that…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Be Sure to Visit One Identity at the Gartner IAM Summit in Vegas

    Be Sure to Visit One Identity at the Gartner IAM Summit in Vegas

    Bill.Evans
    Bill.Evans

    I wanted to remind you that One Identity will be on full display at the Gartner IAM Summit in Vegas from November 29 - December 1, 2016 at Caesar’s Palace. We have lots going on and it will be a good opportunity for you to see the products and even meet…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Save Time, Money and Accelerate the Integration of Cloud Apps With One Identity's Connect for Cloud

    Alex Binotto
    Alex Binotto

    As a product manager, I have the luxury of meeting customers from all around the globe and from all types of organizations. I’ve learned from these experiences that as the competitive landscape evolves, speed of adoption and adaption is paramount. Today…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Join Sponsor One Identity for March 9th Cyber Smoke

    Join Sponsor One Identity for March 9th Cyber Smoke

    Danielle.Vorce
    Danielle.Vorce

    Cyber Smoke is a premier after-hours networking event initially created for Industry and Government professionals to collaborate on cyber security initiatives at DHS.  It has since grown from the 6 original founders to well over 850 Industry and Government…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Security Pays … Just Ask Yahoo, What It Costs to Get It Wrong

    Security Pays … Just Ask Yahoo, What It Costs to Get It Wrong

    Bill.Evans
    Bill.Evans

    If there’s anyone that still doesn’t believe that an investment in security will pay dividends need only read today’s latest headline regarding the recent spate of breaches involving Yahoo.  Here’s a link to just one of the many articles…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Another successful One Identity User Conference has concluded

    Bill.Evans
    Bill.Evans

    We held our third One Identity user conference during the first week of April in Lisbon Portugal. This informative and interactive event is held twice a year with venues alternating between Europe and the North America. This time, it was Europe’s turn…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Tame Your SAP Environment/Modules - and All Your Enterprise Applications With One Governance Solution

    Tame Your SAP Environment/Modules - and All Your Enterprise Applications With One Governance Solution

    George Cerbone
    George Cerbone

    One of the more challenging problems of identity and access management (IAM) is dealing with the dizzying array of user entitlements. Answers to simple questions such as, ‘What resources does George have access to?’ or ‘Who has access to this resource…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Getting Identity and Access Management Right – Even If SAP Is Involved

    Getting Identity and Access Management Right – Even If SAP Is Involved

    Allison Main
    Allison Main


    DATE: Tuesday, May 23, 2017

    TIME: 4:00pm CEST, 10:00am ET, 7:00am PT

    Register for Webcast Now

    IT departments are struggling to make this access frictionless for users yet maintain compliance with corporate and government-imposed security and privacy…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Five Tips to Get Identity and Access Management Right – the First Time

    Five Tips to Get Identity and Access Management Right – the First Time

    Rogier.Egberink
    Rogier.Egberink

    As businesses look to move to the cloud and add value through digital transformation, data has moved beyond the perimeter. Organisations now need to offer secure anytime, anywhere access to customer and corporate data to deliver the best products and…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • So Now I Know What GDPR Is … What's Next?

    So Now I Know What GDPR Is … What's Next?

    Todd Peterson
    Todd Peterson

    There’s a growing buzz about this new regulation called GDPR (General Data Protection Regulation). It requires any organization that stores, processes, or transmits personal data on European Union citizens (even organizations outside of the EU) to undertake…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    When Security Lacks Context … AKA: That Guy With a Big, Annoying Ring of Keys

    Todd Peterson
    Todd Peterson

    Let’s talk for a minute about security, or more specifically, let’s talk about the security of your IT systems, your users, and the data that they both use to further your business. Security is really important, after all if your stuff falls into the…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • Get ready for May 2018 and the European Union’s General Data Protection Regulation (GDPR)

    Get ready for May 2018 and the European Union’s General Data Protection Regulation (GDPR)

    Todd Peterson
    Todd Peterson

    As if PCI, SOX, HIPAA, GLB, and all the other alphabet-soup regulations aren’t enough to bog down your security program, we now have a new one rearing its ugly head. The new regulation is the European Union General Data Protection Regulation – or GDPR…

    • over 6 years ago
    • Blogs
    • Identity Governance & Administration
  • Ensuring Compliance With HIPAA Security Rule Requirements

    Ensuring Compliance With HIPAA Security Rule Requirements

    Allison Main
    Allison Main

    Just because you leverage the user, group and role-based management features of certified Electronic Health Record (EHR) systems that doesn’t mean you’re doing enough to secure healthcare data and ensure compliance with HIPAA Security Rule requirements…

    • over 7 years ago
    • Blogs
    • Identity Governance & Administration
  • View related content throughout Blogs
  • More
  • Cancel
>
  • Company
    • About Us
    • Buy
    • Careers
    • Contact Us
    • News
  • Resources
    • Blogs
    • Customer Stories
    • Documents
    • Events
    • Videos
  • Support
    • Professional Services
    • Renew Support
    • Technical Support
    • One Identity University
    • Support Service
  • Social Networks
    • Facebook
    • Instagram
    • LinkedIn
    • Twitter
    • YouTube
  • © 2024 One Identity LLC. ALL RIGHTS RESERVED.
  • Legal
  • Terms of Use
  • Privacy
  • Community Feedback & Support
  • Cookie Preference Center