May 23, 2019
1 PM ET
Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. IAM implementation is no longer about promoting efficiency during…
Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. IAM implementation is no longer about promoting efficiency during…
The KuppingerCole Leadership Compass reports provide detailed, independent reviews of the markets and key products for both the Privileged Access Management (PAM) and Access Governance (AG) market segments. One Identity is one of the only vendors to be…
One of my favorite classic holiday movies is Elf. It has several great rules to live by including, “gum on the street is not free candy” and “a peep show is not getting to look at your presents early.” But one of the one of the…
Upgrade from Identity Manager 6.x - Synchronization
Welcome to the first installment of our Upgrade to Awesome blog series, in it we'll take a look at the performance boost in version 7 connectors. This is important to understand as we prepare for the…
As we prepare for the One Identity UNITE EMEA Partner Conference on the beautiful island of Malta in southern Europe, we also celebrate One Identity’s successful first year as an independent company. To demonstrate that success and how we are preparing…
In the coming weeks, you will undoubtedly hear more from us about One Identity UNITE. UNITE is the new name for our growing series of events that bring together our user and partner communities to learn, collaborate and have fun. We will debut the UNITE…
Commercial Vehicle Group cuts user access reviews from months to weeks and achieves regulatory compliance with automated identity and access management.
For Commercial Vehicle Group, effective monitoring of IT user access is absolutely critical. The company…
As businesses look to move to the cloud and add value through digital transformation, data has moved beyond the perimeter. Organisations now need to offer secure anytime, anywhere access to customer and corporate data to deliver the best products and…
Identity and access management (IAM) is often a challenge for companies, with inconsistent and labour-intensive processes. For Swiss Post, the national postal service of Switzerland, IAM was a drain on resources because the organisation lacked an automated…
DATE: Tuesday, May 23, 2017
TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
IT departments are struggling to make this access frictionless for users yet maintain compliance with corporate and government-imposed security and privacy…
As a product manager, I have the luxury of meeting customers from all around the globe and from all types of organizations. I’ve learned from these experiences that as the competitive landscape evolves, speed of adoption and adaption is paramount. Today…
Date: Tuesday, January 24th at 11am PT / 2pm ET
Today, more than ever, organizations must address the proliferation of cloud-based applications and digitally transform their business to stay ahead of the competition and meet customer’s demands. While…
BHF-BANK achieves 40 percent faster approval times for systems access and cuts administration time on identity management by 20 hours a week.
BHF-BANK, headquartered in Frankfurt and part of the French private banking group Oddo & Cie, has been catering…
In today’s world, organizations need to have the right security policies and practices in place to prevent intrusions, protect data and ensure compliance with corporate policies and government regulations. When security enables an organization to make…
For many organizations, compliance with data security standards doesn’t seem to be getting easier. Compliance efforts often compete with projects that address information security threats and vulnerabilities, and these efforts often lose out in the battle…
While relatively a newcomer to the IT compliance scene, PCI DSS has been mandated by all members of the PCI Security Standards Council, including Visa International, MasterCard Worldwide, American Express, Discover Financial Services and JCB International…
Using the user, group and role-based management features of payment and business applications that accept cardholder data or sensitive authentication data is not enough to secure your data and ensure compliance with PCI DSS requirements.
The set of system…
Digital Transformation of business is unstoppable. It affects virtually all industries. The IoT (Internet of Things) is just a part of this transformation. Organizations that do not adapt to the transformation are risking their very survival. Furthermore…
A common misconception is that Digital Transformation is limited to certain industries, such as the ones supplying “smart homes” or “smart cities”. This is wrong. In fact, nearly every organization is impacted by Digital Transformation. Prominent examples…
Many people associate Digital Transformation with connecting things – the IoT (Internet of Things) as the quintessence of Digital Transformation. Connected things are part of the transformation, but it is about everything – business models, services…
Digital Transformation adds billions of connected devices and things to what we already have in place. Therefore, we must learn to manage and thrive with the complex relationships of new organizations and their systems, devices, things and people
It…