Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM

At One Identity, we’re proud to share that Gartner has recognized us as a Visionary in the 2025 Gartner Magic Quadrant for Privileged Access Management (PAM). In a market transforming faster than ever, we believe innovation and proven performance matter most. Our placement as a Visionary reflects what we see every day with our customers and partners – a shared commitment to simplify security, accelerate adoption and bring intelligence to identity protection.

Active Roles ranked #1 Active Directory Solution

We are excited to share that Active Roles is on a roll with multiple rankings awarded this quarter! We thank our loyal customers for using our product and making sure the world knows about the security, efficiency and cost-saving benefits they have achieved with it.

Automated provisioning and governance for healthcare company, B Braun

Join B Braun representatives Andreas Müller, IT project manager, and Michal Kasynski, identity manager engineer as they explore their choice of One Identity Manager for their healthcare and pharmaceutical company’s identity governance and administration (IGA) needs.

Paul Hartmann AG optimizes identity management with One Identity

For the medical industry, clean directories, end-to-end security and streamlined workloads are key to ensuring quick, professional relationships with clients. And for a company that deals with medical products in areas such as wound care, hospitals, surgical centers and home care, data protection needs to cover both patients and their healthcare providers. For this, Germany-based Paul Hartmann AG turned to One Identity Manager for its smooth integration with every SAP system in their environment and optimized account creation with secure, efficient identity lifecycle management.

IAM Principal Consultant & Head of Center of Excellence One Identity - iC Consult

iC Consult’s partnership with One Identity has gone back a long time, thanks to the comprehensive One Identity portfolio of unified IAM solutions. Join Oliver Paulzen to explore the advantages of the iC Consult-One Identity partnership and the benefits of the integrated solutions that make up the One Identity Fabric.

How agentic AI and non-human identities are transforming cybersecurity

Within the average enterprise, non-human identities (NHIs) now outnumber employees, contractors, and customers by anything between 10-to-1 and 92-to-1. Add to this the fragmentation of human identity management resulting from authorizing a single person’s access to multiple on-premises, cloud computing and hybrid environments, and enterprise identity and access management (IAM) becomes extremely challenging.

Ephemeral accounts don't leave an audit trail, and that's a problem

Ephemeral accounts are temporary, high-privilege accounts created for short-term use. They’re a convenient way to get quick, temporary access to systems, data or applications for one-off tasks. Need temporary admin rights for a few minutes? Just create an ephemeral account, complete your task and move on. But behind the convenience of these temporary credentials loom serious security threats.

Understanding non-human identity management: Lessons from a PeerSpot One Identity use case

The management of non-human identities (NHI) presents unique challenges that many identity and access management professionals are still learning to navigate. Service accounts, provisioned accounts, and automated system credentials require governance approaches that differ significantly from traditional user management.

NIS2 and your admin accounts: Are you ready?

The NIS2 Directive (NIS2) is now in effect, but some organizations still haven’t taken action – risking a sharp reckoning as the directive marks a major shift in compliance requirements. Compared to other cybersecurity legislation, NIS2 is less about ticking compliance boxes and more of a ground-up rethink of an organization’s entire security posture, especially when it comes to privileged access. We’ve seen this before with GDPR.