One Identity

Aliso Viejo, CA, USA
2011
  |  By Cengiz.Tuztas
The SAP GRC (Governance, Risk Management and Compliance) Framework is a collection of enterprise software applications that help organizations control access and prevent fraud across the enterprise. At the same time, they can minimize the time and cost of compliance with internal and external regulations. The SAP GRC framework comprises the SAP Access Control and SAP Cloud Identity Access Governance solutions.
  |  By jason moody
The cloud stands as a revolutionary force, redefining the way businesses operate, collaborate and innovate. Its scalability, flexibility and accessibility have transformed industries, offering a wealth of opportunities for organizations of all sizes. However, with these advancements come significant security concerns, particularly in managing access to sensitive data and critical systems.
  |  By Josh Karnes
We recently published a blog titled Defending Your Organization Against Session Cookie Replay Attacks. This blog thoroughly examined the menace of session cookie replay attacks, shedding light on the potential risks and consequences they pose to online security. The post delved into the intricacies of session cookie replay attacks, detailing their working mechanisms and the extensive damage they can inflict and emphasizing the imperative need to comprehend and fortify against such threats.
  |  By One Identity
One Identity announces significant expansion of their strategic partnership with the general availability of a seamless integration between One Identity Active Roles and AWS Directory Service. This collaboration strengthens security and enhances efficiency, and reinforces the principle of least privilege, offering customers best-in-class control over their Azure Active Directory and AWS Directory Service environments.
  |  By marc maguire
In the current cyber threat landscape, where online security is paramount, the threat of session cookie replay attacks looms large. These attacks sidestep the conventional need for credentials and aim to hijack your online sessions, potentially compromising sensitive data and taking over user accounts. This blog post delves into the intricacies of session cookie replay attacks, shedding light on what they are, how they work, and the potential consequences they can unleash.
  |  By Ted Ernst
Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk and satisfies compliance by giving users access to data and applications they need – and only what they need – whether on-premises, hybrid or in the cloud. Now, identity security can be driven by business needs, not by IT capabilities. With Identity Manager, you can unify security policies and satisfy governance needs — today and long into the future.
  |  By vipin jain
The biggest problem with granting too many permissions is that you may be delegating the right to grant permissions. In the realm of cybersecurity, few areas are as critical as managing privileged access. Privileged accounts, often referred to as the "keys to the kingdom," have the power to unlock and control vast portions of an organization's IT infrastructure.
  |  By jason moody
The intersection of privilege escalation and identity is taking on new dimensions with the advent of Artificial Intelligence (AI). As AI becomes increasingly integrated into our lives, it both challenges and reinforces existing notions of privilege and identity. In this blog, we'll explore what privilege escalation means in the context of AI and how it influences our understanding of personal and societal identities.
  |  By Robert Byrne
Directories, particularly your Microsoft directories, are where it all starts. Active Directory and Microsoft Entra ID (formerly, Azure AD) contain accounts, computers and resources that form the cornerstone of your IT security infrastructure. At One Identity, we are speaking with more and more organizations coming to the realization that Active Directory, however "legacy", is more crucial than ever.
  |  By Serkan Cetin
In an era where data security and access management are crucial, organizations are constantly on the lookout for modern ways to enhance their governance strategies. What if you could not only manage user identities and access rights but also extend this governance to protect privileged access, applications, cloud infrastructure and data? What if there was a comprehensive identity governance framework that could integrate and manage all your systems seamlessly?
  |  By One Identity
Identity security is at the forefront of protecting your organization. Join us to learn from industry experts and enhance your technical and business knowledge with hours of free technical training.
  |  By One Identity
An enterprise attack surface is a sum of the entry and access points to your organization. Join Robert Byrne, One Identity Field Strategist, as he explains the factors that contribute to the expansion of the modern organization’s enterprise attack surface. Discover how to shrink your organization’s attack surface to minimize risk and enhance security.
  |  By One Identity
Join Stuart Sharp, OneLogin VP of Product, as he explores Identity as a Service (IDaaS) and its role in supporting the growth of Software as a Service (SaaS). Sharp covers how IDaaS can improve identity management efficiency, help save on maintenance costs and secure user identities in the Cloud.
  |  By One Identity
In an era of endless data, being able to zero in on the information that really matters is crucial to avoid security risks and breaches. You’ll discover how to reduce your attack surface by focusing on the correct information.
  |  By One Identity
Watch this demo to discover how OneLogin Workforce Identity enhances security and productivity by simplifying access management and providing a seamless user experience.
  |  By One Identity
Watch this demo to learn how OneLogin Customer Identity enables organizations to control access to web applications and services while providing a seamless, customized login experience for customers.
  |  By One Identity
René Drabo, IAM Specialist, explains how POST protects against modern security threats and consistent access-management controls with One Identity Manager and partner IAM Experts.
  |  By One Identity
Hear from Darren Thomson, VP of Product Marketing, discuss industry trends influencing identity security such as evolving threat landscape and expanding attack surfaces, cyber insurance and advanced authentication. How can organization be more secure and protect themselves.
  |  By One Identity
Discover the core principles of Advanced Authentication and how this security approach empowers organizations to stay steps ahead of cyber threats while simplifying the user experience.
  |  By One Identity
Join us to discover how adopting IDaaS (OneLogin) within your IAM deployment can supercharge your security posture, processes and user experience.
  |  By One Identity
What if you could take your organization's governance of identities and access rights of users, and extend it to protect privileged access, applications, cloud infrastructure and data? What if you had an entire identity governance framework under which you could integrate and manage all your systems? Then, you could extend a comprehensive and efficient identity governance strategy across your entire organization.
  |  By One Identity
Maintaining Active Directory (AD) in a clean, organized and secure state is a challenge, particularly for user accounts. Learn 10 steps you can take to enhance the agility, security, and performance of Active Directory and Azure Active Directory. This process is key to efficiency, security and compliance. We will take you through each step, demonstrate why it's important and what it will enable your team to do faster and more securely.
  |  By One Identity
Now, there's no reason why you can't have a complete view of all your identities and rights, from standard-user to privileged users. One Identity's Privileged Access Governance (PAG) bridges the management gap. Learn how you can use account provisioning and access governance capabilities of an identity governance and administration (IGA) system while continuing to leverage your privilege account, access- and session-management capabilities of PAM technologies.
  |  By One Identity
One of the most important aspects of an identity security program is the management and governance of the accounts belonging to superusers - privileged accounts. Like the accounts used by regular users, these superuser accounts require access management - ensuring that admins have the access they need to do their job - and governance - ensuring that there is oversight and control over that access, often for the purpose of compliance.
  |  By One Identity
With the complexity of today's IT landscape and the critical role that privileged access security plays in protecting what's essential to your organization - your people, your applications and your data - it's more important than ever to have an effective privileged access management (PAM) cybersecurity strategy.
  |  By One Identity
You've got nearly all the pieces in place - you've implemented enterprise user provisioning, password management and have secured your organization's data. However, most days you still feel that sensitive data, such as IP or customer information, is at risk for a data breach. It's time to let a secure Data Governance strategy protect your sensitive data and reduce risk. Why, you ask? Take a look at this e-Book to learn ten reasons why.

One Identity delivers solutions that help customers strengthen operational efficiency, reduce risk surface, control costs and enhance their cybersecurity. Our Unified Identity Platform brings together best-in-class software to enable organizations to shift from a fragmented identity strategy to a holistic approach.

Control identity sprawl and bring governance to the far reaches of your enterprise. See how you can unify your identity security strategy from on-prem to the cloud and back again with our modular and integrated Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Active Directory Management (AD Mgmt) portfolios.

Solutions for your most-critical challenges:

  • Secure the organization: Protect the people, applications and data that are essential to business with unified identity security.
  • Drive operational efficiencies: Streamline process, reduce errors and minimize complexity associated with managing identities.
  • Enable compliance and auditing: Satisfy regulatory, industry, and jurisdictional requirements related to identity security.
  • Support digital transformation: Take measured steps to ensure digital transformation initiatives stay in line with identity security best practices.
  • Enhance log management: Reliably collect, store and manage logs from hundreds of systems across the enterprise.

Unify, Verify and Adapt.