Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One Identity

Integrating PAM with SIEM: Enhancing threat detection and response

When we think about privilege access management (PAM), we typically think about it first as preventive control. PAM solutions manage who has privileged access to systems, enforce least-privilege principles and monitor and record privileged user activity. This is crucial for preventing misuse of high-level permissions and ensuring accountability.

Understanding Context-based requests for SAP in Identity Manager

Context is important. And there is no exception when traversing the realm of cybersecurity, especially when dealing with Roles within SAP ABAP systems. In Identity Manager, Context-based requests come up frequently enough to require well-organized, air-tight configuration. But what exactly are you configuring? And is it going to be hard to follow this road? What is Context in SAP roles? Organizations, especially large organizations utilizing SAP, will have lots of SAP roles to sort through.

Introducing XIAM: A fresh approach to external identity and access management

Over the past few years, the identity security industry has been buzzing with terms like “convergence.” These days, it feels like everyone offers a “unified” cybersecurity platform. It’s as if we all woke up one day in 2021 and realized that solving our identity security problems with a siloed array of “best-in-breed” point solutions could leave gaps in coverage or create confusion with overlapping functionalities.

IAM funding challenges? Think like a business leader

A couple of weeks ago, we started talking about cybersecurity spending and how we, as security professionals, need to rethink prioritizing those budgets to match the cyber threat landscape. One key takeaway: identity and access management (IAM) is chronically underfunded compared to other, more glamorous security initiatives.

What the experts say: complexity is the greatest identity security challenge

The results of the yearly IDSA (Identity Defined Security Alliance) survey are out, revealing some surprising and insightful numbers. Let’s dive in! Identity: a growing priority Just how important is identity? The vast majority (73 percent) of respondents say it’s a top three priority, with 22 percent saying it’s the very top priority within their company’s security program.

AI in cybersecurity 101: Bridging the skills gap

“Four million workers wanted. Immediate start. Must have knowledge, experience and an ability to be in several places at once.” If the cybersecurity industry posted a job ad, it would sound something like this. That is the current reported size of the talent shortage, with “little optimism that the supply will catch up.”

Governing access to the Microsoft Dynamics estate

ERP and CRM systems are key parts of an organization’s business infrastructure and digital transformation initiatives. One Identity frequently works with customers who use systems from vendors such as SAP, Salesforce and Oracle, and we are seeing more organizations using Microsoft Dynamics products. This is probably due to two factors: a heightened awareness of the importance of Identity Governance to the Dynamics community, and the growth in the adoption of Dynamics products.

5 privileged access management best practices to thrive in the hybrid and multi-cloud era

The world is becoming more cloud-native every day. Infrastructure spending is estimated to rise by 19.3 percent in 2024, partly driven by ‘new and existing mission-critical workloads.’ Investment and innovation is going hand-in-hand, as new and established businesses race to modernize architecture and provision applications. At the same time, many are demanding hyperscale and high-performance cloud providers to run AI and machine learning services.

The impact of quantum computing on PAM: Preparing for the future

Quantum computing is poised to revolutionize the world. From simulating atoms and molecules to mapping and modeling in medicine, the potential use cases are vast and still unfolding. It may seem far on the horizon, but for those in cybersecurity, especially privileged access management, now is the time to start planning.

PAM Essentials: A breakthrough in secure access solutions

We're excited to announce new capabilities of One Identity’s Cloud PAM Essentials, launched in March 2024, featuring our innovative Secure Gateway secure tunnel solution. This groundbreaking product offers a VPN-less solution designed to provide secure, seamless access to your critical resources. The journey from initiation to market release took just nine months, a testament to our team's dedication and efficiency.