One Identity

Aliso Viejo, CA, USA
May 25, 2023   |  By Eric Hibar Jr.
When it comes to securing Active Directory, the first place to start is usually getting a handle on what currently exists - getting a ‘lay of the land,’ so to speak. In Active Directory, the admincount attribute can play a role in identifying privileged accounts. It’s not without its faults, however. In this blog, we will explore the admincount attribute in more detail and potential uses it may have for determining which accounts may have or had privileged access.
May 17, 2023   |  By jason moody
In today's business landscape, organizations rely heavily on digital systems, applications, and webpages for their daily operations. However, with the increasing use of technology comes growing risks of unauthorized access to sensitive information and data.
May 16, 2023   |  By Serkan Cetin
There’s a new cybersecurity challenge threatening the identity processes and systems of organizations worldwide: identity fatigue.
May 15, 2023   |  By Alan.Radford
Privileged Access Management (PAM) is a critical component of any organization's cybersecurity strategy. Privileged accounts provide access to the most sensitive data and systems within an organization. As such, it's essential to manage them carefully to prevent unauthorized access, data breaches and cyberattacks. Here are some best practices for implementing PAM in your organization to ensure that your privileged accounts are secure and protected.
May 3, 2023   |  By Dan Conrad, IAM Strategist
Password managers have become popular solutions for businesses and individuals seeking to improve the password security of their accounts. The implementation of password management solutions within organisations has enabled security teams to securely store and manage company credentials for online and offline applications by using advanced encryption.
May 2, 2023   |  By Allison Main
The gender gap in STEM fields is a huge problem. Women only make up 25.2% of the computer and mathematical occupations in STEM, even though these jobs are among the fastest growing and highest paid in the world. Why is this happening? What can we do to bridge the gap and get more women these lucrative careers? Those are questions we’re doing our part to solve at One Identity UNITE.
Apr 18, 2023   |  By Csaba Galffy
As cyber-attacks become more sophisticated and frequent, businesses are turning to cyber insurance policies as a means of protection. Increasingly, CISO’s and Board of Directors are eager to take advantage of “risk transference” as part of a holistic cyber risk management strategy. However, the cost of such policies can often be a significant concern for organizations.
Apr 12, 2023   |  By jason moody
Privileged Access Management (PAM) is a critical aspect of cybersecurity that helps organizations protect their sensitive data from unauthorized access. By controlling and monitoring access to privileged accounts, PAM solutions can prevent cyberattacks, data breaches and compliance violations. However, some organizations fail to implement PAM, leaving themselves vulnerable to various risks.
Apr 12, 2023   |  By Josh Karnes
Identity and Access Management (IAM) in most organizations is typically provided by Access Management, Privileged Access Management (PAM) and Identity Governance and Administration (IGA) solutions. Unfortunately, many of these solutions work independently in silos, and efforts to integrate them to work together can be patchwork at best.
Apr 11, 2023   |  By Bruce Esposito
Privileged accounts are the root of most threat vectors. So, it’s critical to take proper precautions to prevent catastrophic breaches. However, it often takes extra time and effort to fully recognize and mitigate Privileged Access Management security risks that put your organization at risk.
May 29, 2023   |  By One Identity
Video Series: One Identity - Identity Manager - Update 9.x Video 3: Features and Enhancements.
May 24, 2023   |  By One Identity
See how Bureau Veritas (a world leader in TIC, testing, inspection and certification) improves their cybersecurity and mitigates risk with the help of OneLogin and One Identity.
May 24, 2023   |  By One Identity
Video Series: One Identity - Identity Manager - Update 9.x Video 2: Connected System Module Enhancements.
May 22, 2023   |  By One Identity
Video Series: One Identity - Identity Manager - Update 9.x Video 1: LTS and Security Enhancements.
May 19, 2023   |  By One Identity
*** Sorry, it was necessary to replace the original, broken one with this copy. Video Series: Angular Web Development #12 Part 3: Modifying the Standard Web Portal.
May 17, 2023   |  By One Identity
Video Series: Angular Web Development #12 Part 3: Modifying the Standard Web Portal.
May 15, 2023   |  By One Identity
Video Series: Angular Web Development #11 Part 3: Modifying the Standard Web Portal.
May 11, 2023   |  By One Identity
See how Volksbank assures the correct amount of access to its 20,000 employees.
May 11, 2023   |  By One Identity
Learn how global retailer Adeo protects is critical user data without complicating application access.
May 10, 2023   |  By One Identity
Video Series: Angular Web Development #10 Part 3: Modifying the Standard Web Portal
May 3, 2023   |  By One Identity
Maintaining Active Directory (AD) in a clean, organized and secure state is a challenge, particularly for user accounts. Learn 10 steps you can take to enhance the agility, security, and performance of Active Directory and Azure Active Directory. This process is key to efficiency, security and compliance. We will take you through each step, demonstrate why it's important and what it will enable your team to do faster and more securely.
May 3, 2023   |  By One Identity
What if you could take your organization's governance of identities and access rights of users, and extend it to protect privileged access, applications, cloud infrastructure and data? What if you had an entire identity governance framework under which you could integrate and manage all your systems? Then, you could extend a comprehensive and efficient identity governance strategy across your entire organization.
Apr 1, 2023   |  By One Identity
Now, there's no reason why you can't have a complete view of all your identities and rights, from standard-user to privileged users. One Identity's Privileged Access Governance (PAG) bridges the management gap. Learn how you can use account provisioning and access governance capabilities of an identity governance and administration (IGA) system while continuing to leverage your privilege account, access- and session-management capabilities of PAM technologies.
Apr 1, 2023   |  By One Identity
One of the most important aspects of an identity security program is the management and governance of the accounts belonging to superusers - privileged accounts. Like the accounts used by regular users, these superuser accounts require access management - ensuring that admins have the access they need to do their job - and governance - ensuring that there is oversight and control over that access, often for the purpose of compliance.
Mar 1, 2023   |  By One Identity
With the complexity of today's IT landscape and the critical role that privileged access security plays in protecting what's essential to your organization - your people, your applications and your data - it's more important than ever to have an effective privileged access management (PAM) cybersecurity strategy.
Mar 1, 2023   |  By One Identity
You've got nearly all the pieces in place - you've implemented enterprise user provisioning, password management and have secured your organization's data. However, most days you still feel that sensitive data, such as IP or customer information, is at risk for a data breach. It's time to let a secure Data Governance strategy protect your sensitive data and reduce risk. Why, you ask? Take a look at this e-Book to learn ten reasons why.

One Identity delivers solutions that help customers strengthen operational efficiency, reduce risk surface, control costs and enhance their cybersecurity. Our Unified Identity Platform brings together best-in-class software to enable organizations to shift from a fragmented identity strategy to a holistic approach.

Control identity sprawl and bring governance to the far reaches of your enterprise. See how you can unify your identity security strategy from on-prem to the cloud and back again with our modular and integrated Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), and Active Directory Management (AD Mgmt) portfolios.

Solutions for your most-critical challenges:

  • Secure the organization: Protect the people, applications and data that are essential to business with unified identity security.
  • Drive operational efficiencies: Streamline process, reduce errors and minimize complexity associated with managing identities.
  • Enable compliance and auditing: Satisfy regulatory, industry, and jurisdictional requirements related to identity security.
  • Support digital transformation: Take measured steps to ensure digital transformation initiatives stay in line with identity security best practices.
  • Enhance log management: Reliably collect, store and manage logs from hundreds of systems across the enterprise.

Unify, Verify and Adapt.