Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

From SAP IDM to One Identity: The preferred path for seamless migration

SAP recently announced the end-of-life for SAP Identity Manager (IDM). This announcement required SAP to establish guidelines for existing customers to transition away from the platform with other products. One Identity is a leading vendor of choice for this migration due to its well-established market presence and robust SAP solutions support. In this two-part blog series, we will shed some light on how One Identity can seamlessly integrate with SAP products, starting with its certified ABAP connector.

The password problem: Why organizations are going passwordless

Knowledge is power, right? Well, yes – except when it comes to access and authentication. That’s because knowledge-based factors, in the form of passwords, are making organizations less powerful, and more vulnerable. As a result, many are looking toward a future beyond passwords. You may have seen the Forrester report estimating that 80% of security breaches involved privileged credentials.

Navigating the cyber insurance maze: How to avoid claim denials

Cyber insurance is a critical form of risk management, designed to mitigate the financial impact of a breach or other security incidents. By spreading the risk, it helps reduce the potentially catastrophic consequences to manageable levels. Cyber insurance is a fundamentally financial tool that is often handled by the financial or insurance arm of any organization, with strong involvement of the cyber security teams. While complex, this blog aims to simplify the essentials.

Why Active Directory is your security perimeter

Active Directory (AD), a Microsoft Windows directory service, helps maintain a robust security perimeter within enterprise environments. It helps your business enforce security policies, assign permissions and mitigate security risks within the network. Let’s say your business’s IT infrastructure is a fortress, wherein AD acts as the gatekeeper controlling who enters and what they have access to.

From crisis to control: Unveiling PAM vendor security flaws and a path to resilience

Cyber attackers relentlessly scour online resources for vulnerabilities, particularly within software solutions. Despite the best efforts of dev teams and quality assurance processes, maintaining a defensive edge is a relentless challenge. Unfortunately, vulnerabilities persist, especially in trusted software solutions used by companies as the cornerstone of their cybersecurity posture, such as privileged access management (PAM).

Break free from IAM limitations: How disconnected identities throttle your business and what you can do about it

Imagine this: a sales representative at your company needs to update customer information in your CRM system. She enters her login credentials, but the system rejects them. After a frustrating series of password resets and calls to IT, she finally gains access. But her ordeal isn't over yet. She still needs to log into several other applications: the marketing automation platform, the customer support portal and the internal communication tool – each with its own unique username and password.

How One Identity can support SAP environments

In part two of this blog series, we will look at how One Identity can support SAP environments from an Identity and Access Management (IAM) perspective. As SAP Identity Management (IDM) reaches its end-of-maintenance, customers will need to explore alternatives for their identity management landscapes. Here is a list of some key elements to consider.

Taming the many-headed monster of data privacy law

If you think data privacy law is a minefield, you’re not alone. At our last count, there were 120 jurisdictions around the globe, each with their own data privacy legislation. Each set of legislation is as complex and intricate as the next. How are you supposed to tame this multi-headed monster? How on earth did we end up here? Let’s look at the current state of global data protection legislation, where it’s headed and what you can do about it.

5 ways IAM helps with cybersecurity

Identity and Access Management (IAM) is a cybersecurity discipline, so it’s almost trivial to claim that a solid IAM foundation brings critical security benefits for any organization. Fundamentally, IAM allows the right people to access the right resources at the right times, in the right way for the right reasons. Yet IAM projects consistently take a backseat to other, more fashionable cybersecurity initiatives in a lot of organizations, ultimately harming the security posture.

The dangers of enterprise attack surface expansion: Lessons from 5 major breaches

Enterprise attack surface expansion has become a focal point for IT security teams. The relentless pursuit of securing every endpoint and countering new threats with the latest technology is not just costly; it's also unsustainable. Despite these efforts, breaches continue to occur, often through new or unorthodox attack vectors that bypass traditional perimeter defenses.