One Identity

Aliso Viejo, CA, USA
2011
Jun 6, 2023   |  By jason moody
Privileged Access Management (PAM) is a crucial aspect of any organization's cybersecurity strategy, especially in industries that handle sensitive data, such as health care, finance and government. PAM involves implementing policies, procedures and tools to manage and monitor access to privileged accounts and limit the risk of unauthorized access or misuse. This ensures that only authorized personnel can access critical systems and data, reducing the chances of a security breach.
May 31, 2023   |  By darren thomson
In the past five years, Enterprise Attack Surfaces (EAS) have evolved significantly. EAS refer to the various entry points that cybercriminals can exploit to gain unauthorized access to an organization's digital assets. With the increasing use of cloud-based services, the proliferation of connected devices and the growing reliance on third-party vendors, attack surfaces have become broader, more numerous and more complex.
May 25, 2023   |  By Eric Hibar Jr.
When it comes to securing Active Directory, the first place to start is usually getting a handle on what currently exists - getting a ‘lay of the land,’ so to speak. In Active Directory, the admincount attribute can play a role in identifying privileged accounts. It’s not without its faults, however. In this blog, we will explore the admincount attribute in more detail and potential uses it may have for determining which accounts may have or had privileged access.
May 17, 2023   |  By jason moody
In today's business landscape, organizations rely heavily on digital systems, applications, and webpages for their daily operations. However, with the increasing use of technology comes growing risks of unauthorized access to sensitive information and data.
May 16, 2023   |  By Serkan Cetin
There’s a new cybersecurity challenge threatening the identity processes and systems of organizations worldwide: identity fatigue.
May 15, 2023   |  By Alan.Radford
Privileged Access Management (PAM) is a critical component of any organization's cybersecurity strategy. Privileged accounts provide access to the most sensitive data and systems within an organization. As such, it's essential to manage them carefully to prevent unauthorized access, data breaches and cyberattacks. Here are some best practices for implementing PAM in your organization to ensure that your privileged accounts are secure and protected.
May 3, 2023   |  By Dan Conrad, IAM Strategist
Password managers have become popular solutions for businesses and individuals seeking to improve the password security of their accounts. The implementation of password management solutions within organisations has enabled security teams to securely store and manage company credentials for online and offline applications by using advanced encryption.
May 2, 2023   |  By Allison Main
The gender gap in STEM fields is a huge problem. Women only make up 25.2% of the computer and mathematical occupations in STEM, even though these jobs are among the fastest growing and highest paid in the world. Why is this happening? What can we do to bridge the gap and get more women these lucrative careers? Those are questions we’re doing our part to solve at One Identity UNITE.
Apr 18, 2023   |  By Csaba Galffy
As cyber-attacks become more sophisticated and frequent, businesses are turning to cyber insurance policies as a means of protection. Increasingly, CISO’s and Board of Directors are eager to take advantage of “risk transference” as part of a holistic cyber risk management strategy. However, the cost of such policies can often be a significant concern for organizations.
Apr 12, 2023   |  By jason moody
Privileged Access Management (PAM) is a critical aspect of cybersecurity that helps organizations protect their sensitive data from unauthorized access. By controlling and monitoring access to privileged accounts, PAM solutions can prevent cyberattacks, data breaches and compliance violations. However, some organizations fail to implement PAM, leaving themselves vulnerable to various risks.
Jun 7, 2023   |  By One Identity
Video Series: One Identity - Identity Manager - Update 9.x Video 5: Enhancements in version 9.1.1.
Jun 1, 2023   |  By One Identity
Unleash the Power: Master Passwordless Authentication with Safeguard for Privileged Passwords.
May 31, 2023   |  By One Identity
Video Series: One Identity - Identity Manager - Update 9.x Video 4: HTML5 Web and History-DB.
May 29, 2023   |  By One Identity
Video Series: One Identity - Identity Manager - Update 9.x Video 3: Features and Enhancements.
May 24, 2023   |  By One Identity
See how Bureau Veritas (a world leader in TIC, testing, inspection and certification) improves their cybersecurity and mitigates risk with the help of OneLogin and One Identity.
May 24, 2023   |  By One Identity
Video Series: One Identity - Identity Manager - Update 9.x Video 2: Connected System Module Enhancements.
May 22, 2023   |  By One Identity
Video Series: One Identity - Identity Manager - Update 9.x Video 1: LTS and Security Enhancements.
May 19, 2023   |  By One Identity
*** Sorry, it was necessary to replace the original, broken one with this copy. Video Series: Angular Web Development #12 Part 3: Modifying the Standard Web Portal.
May 17, 2023   |  By One Identity
Video Series: Angular Web Development #12 Part 3: Modifying the Standard Web Portal.
May 15, 2023   |  By One Identity
Video Series: Angular Web Development #11 Part 3: Modifying the Standard Web Portal.
May 3, 2023   |  By One Identity
Maintaining Active Directory (AD) in a clean, organized and secure state is a challenge, particularly for user accounts. Learn 10 steps you can take to enhance the agility, security, and performance of Active Directory and Azure Active Directory. This process is key to efficiency, security and compliance. We will take you through each step, demonstrate why it's important and what it will enable your team to do faster and more securely.
May 3, 2023   |  By One Identity
What if you could take your organization's governance of identities and access rights of users, and extend it to protect privileged access, applications, cloud infrastructure and data? What if you had an entire identity governance framework under which you could integrate and manage all your systems? Then, you could extend a comprehensive and efficient identity governance strategy across your entire organization.
Apr 1, 2023   |  By One Identity
Now, there's no reason why you can't have a complete view of all your identities and rights, from standard-user to privileged users. One Identity's Privileged Access Governance (PAG) bridges the management gap. Learn how you can use account provisioning and access governance capabilities of an identity governance and administration (IGA) system while continuing to leverage your privilege account, access- and session-management capabilities of PAM technologies.
Apr 1, 2023   |  By One Identity
One of the most important aspects of an identity security program is the management and governance of the accounts belonging to superusers - privileged accounts. Like the accounts used by regular users, these superuser accounts require access management - ensuring that admins have the access they need to do their job - and governance - ensuring that there is oversight and control over that access, often for the purpose of compliance.
Mar 1, 2023   |  By One Identity
With the complexity of today's IT landscape and the critical role that privileged access security plays in protecting what's essential to your organization - your people, your applications and your data - it's more important than ever to have an effective privileged access management (PAM) cybersecurity strategy.
Mar 1, 2023   |  By One Identity
You've got nearly all the pieces in place - you've implemented enterprise user provisioning, password management and have secured your organization's data. However, most days you still feel that sensitive data, such as IP or customer information, is at risk for a data breach. It's time to let a secure Data Governance strategy protect your sensitive data and reduce risk. Why, you ask? Take a look at this e-Book to learn ten reasons why.

One Identity delivers solutions that help customers strengthen operational efficiency, reduce risk surface, control costs and enhance their cybersecurity. Our Unified Identity Platform brings together best-in-class software to enable organizations to shift from a fragmented identity strategy to a holistic approach.

Control identity sprawl and bring governance to the far reaches of your enterprise. See how you can unify your identity security strategy from on-prem to the cloud and back again with our modular and integrated Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Active Directory Management (AD Mgmt) portfolios.

Solutions for your most-critical challenges:

  • Secure the organization: Protect the people, applications and data that are essential to business with unified identity security.
  • Drive operational efficiencies: Streamline process, reduce errors and minimize complexity associated with managing identities.
  • Enable compliance and auditing: Satisfy regulatory, industry, and jurisdictional requirements related to identity security.
  • Support digital transformation: Take measured steps to ensure digital transformation initiatives stay in line with identity security best practices.
  • Enhance log management: Reliably collect, store and manage logs from hundreds of systems across the enterprise.

Unify, Verify and Adapt.