Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One Identity

Is it possible to shift on-premises Active Directory to the cloud with AWS Managed Microsoft Active Directory?

I’ve seen this question bouncing about in different forums for quite some time now. I haven’t seen any definitive answers because it always depends on the organization’s use of AD. Recently, I noticed something called AWS Managed Microsoft Active Directory. I must admit, six months ago I was not aware of AWS Managed Microsoft Active Directory, but when I started looking into this cloud-based AD solution, some connections started coming together.

Navigating the Intersection of Delegation and Authorization

In the complex world of information management and system administration, two fundamental concepts – delegation and authorization – often intersect to determine how permissions, responsibilities and security are handled. In this blog post, we'll explore the intriguing interplay between delegation and authorization and how they work together to ensure efficient access and secure operations. Delegation: Sharing Responsibility.

Unified Identity - look for the meaning behind the hype!

If you've listened to software vendors in the identity space lately, you will have noticed that "unified" has quickly become the buzzword that everyone is adopting to describe their portfolio. And this is great! Unified identity has some amazing benefits! However (there is always a however, right?) not every "unified" "identity" "security" "platform" is made equal.

SAP GRC (Governance, Risk Management and Compliance) Framework and Identity Manager

The SAP GRC (Governance, Risk Management and Compliance) Framework is a collection of enterprise software applications that help organizations control access and prevent fraud across the enterprise. At the same time, they can minimize the time and cost of compliance with internal and external regulations. The SAP GRC framework comprises the SAP Access Control and SAP Cloud Identity Access Governance solutions.

Harnessing the Power of the Cloud: Understanding the Vital Role of Privileged Access Management

The cloud stands as a revolutionary force, redefining the way businesses operate, collaborate and innovate. Its scalability, flexibility and accessibility have transformed industries, offering a wealth of opportunities for organizations of all sizes. However, with these advancements come significant security concerns, particularly in managing access to sensitive data and critical systems.

Minimizing Your Enterprise Attack Surface

An enterprise attack surface is a sum of the entry and access points to your organization. Join Robert Byrne, One Identity Field Strategist, as he explains the factors that contribute to the expansion of the modern organization’s enterprise attack surface. Discover how to shrink your organization’s attack surface to minimize risk and enhance security.

Improving security and efficiency with IDaaS

Join Stuart Sharp, OneLogin VP of Product, as he explores Identity as a Service (IDaaS) and its role in supporting the growth of Software as a Service (SaaS). Sharp covers how IDaaS can improve identity management efficiency, help save on maintenance costs and secure user identities in the Cloud.