Here are two scenarios I come across frequently, with customers of all sizes, in all industries, when discussing One Identity Active Roles:
- “We have an IGA solution. It already manages our Active Directory just fine. Why do I need this?”
Here are two scenarios I come across frequently, with customers of all sizes, in all industries, when discussing One Identity Active Roles:
When it comes to securing Active Directory, the first place to start is usually getting a handle on what currently exists - getting a ‘lay of the land,’ so to speak. In Active Directory, the admincount attribute can play a role in identifying privileged…
With over 95 percent of the Fortune 1000 companies relying on Microsoft Active Directory (AD) and Azure AD for authentication and single-sign-on support for their user populations, it…
Active Directory (AD) and, more recently, Azure AD have become the de-facto standard for most organizations for controlling what their users have access to and how information flows, depending on memberships within the organizational structure. Some organizations…
The Zero Trust model introduces a fundamental shift to an organization’s security strategy. From the outset, a Zero Trust model assumes that attackers will get in rather than solely focusing on keeping attackers at bay outside of a perimeter. Don’t get…
Interest in Zero Trust and identity security technologies is surging for IT leaders worldwide as breaches and targeted threats increase for organizations worldwide. Many wonder if they are making the right investments in security solutions to enable Zero Trust security…
Account Lifecycle Management programs have transformed since the pandemic, and we heard from IT thought leaders and real users that they must make great strides to increase Active Directory (AD) security and efficiency to handle the digital transformation…
What does the future of security hold? Is Zero Trust a real thing? Is a secure environment achievable for organizations, especially with the aftershocks from 2020? In this on-demand webcast, Cure the 2020 Tech Hangover, our lively panel of experts address…
For enhanced password security, organizations need a simple, highly secure and efficient way for users to reset forgotten passwords and unlock accounts on their own. As an IT Leader, you must implement strong password policies and eliminate risk of data…
After working with Active Directory for longer than I care to confess, the term ‘Zero Trust’ has bubbled up just about everywhere I look. For years, I ignored it, mostly because it sounds too good to be true. I assumed – as with some industry buzzwords…
The ubiquitous use of Microsoft Active Directory (AD) and Azure AD in 95 percent of the global Fortune 1000 companies make it the primary target of cyberattacks. Now, as more and more organizations integrate their Privileged Access Management (PAM) into…
With Microsoft Active Directory (AD) and Azure Active Directory (AAD) in 95 percent of Fortune 1000 organizations worldwide, the hybrid AD environment is a huge target for cyberattacks. It’s a challenge to manage and secure AD/AAD account lifecycle management…
As most companies and organizations adjusted to the abrupt change, I must admit that I missed some of the challenges they were facing. Our company, One Identity – which is a Quest Software business, was probably more prepared than most since a good portion…
This current global health crisis has created chaos and hardship for individuals, families, companies and governments. With events canceled or postponed, offices closed and personal routines put on hold, life as we previously knew it, quickly changed…
As you know, recent events forced nearly every organization in the world to quickly adjust the status of its workforce. Whether it was to transition office-based workers to remote access, to temporarily furlough employees with the intent to bring them…
Hannah Montana was right: you can have the best of both worlds. Though the late 2000s teen queen was singing about her secret double life as a high-flying pop star and a down-to-earth high school student, it turns out that that life goal now also applies…
Which introductory experience do new hires to your organization get? Are they able to login on their first day and access all necessary resources to do their basic job? Or… are they temporarily assigned a left-over cubicle with no phone, computer or network…
Using the single, familiar Active Roles interface, there is no longer a need to be constantly switching between consoles, and writing complex scripts in an attempt to automate, because Active Roles does it for you.
Creation of a user, for example, can…
With version 7.1, the One Identity Active Roles solution has expanded its scope to cover both on-prem AD (as its always done) and Azure AD. Here’s an explanation of how it works.
The ADSI provider serves as the interface between the Active Roles…
Organizations are sprinting to Office 365. In fact, users will have to convert by Oct. 13, 2020 as support for Office 2020 ceases that day. By then, many organizations will be 100-percent cloud, but most are so heavily invested in legacy infrastructure…
The cloud isn’t coming — it’s here. And the quicker we all get on board, the better off we’ll be, right?!
Digital transformation, IT modernization projects and cost-control initiatives all point to the cloud as the easiest, most…
Active Directory holds such a prominent position in the enterprise, that inadequate management and security of this universally accepted directory can be a major barrier to IAM success. For all its goodness, AD is woefully lacking in native management…