Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One Identity

What the experts say: complexity is the greatest identity security challenge

The results of the yearly IDSA (Identity Defined Security Alliance) survey are out, revealing some surprising and insightful numbers. Let’s dive in! Identity: a growing priority Just how important is identity? The vast majority (73 percent) of respondents say it’s a top three priority, with 22 percent saying it’s the very top priority within their company’s security program.

Governing access to the Microsoft Dynamics estate

ERP and CRM systems are key parts of an organization’s business infrastructure and digital transformation initiatives. One Identity frequently works with customers who use systems from vendors such as SAP, Salesforce and Oracle, and we are seeing more organizations using Microsoft Dynamics products. This is probably due to two factors: a heightened awareness of the importance of Identity Governance to the Dynamics community, and the growth in the adoption of Dynamics products.

AI in cybersecurity 101: Bridging the skills gap

“Four million workers wanted. Immediate start. Must have knowledge, experience and an ability to be in several places at once.” If the cybersecurity industry posted a job ad, it would sound something like this. That is the current reported size of the talent shortage, with “little optimism that the supply will catch up.”

5 privileged access management best practices to thrive in the hybrid and multi-cloud era

The world is becoming more cloud-native every day. Infrastructure spending is estimated to rise by 19.3 percent in 2024, partly driven by ‘new and existing mission-critical workloads.’ Investment and innovation is going hand-in-hand, as new and established businesses race to modernize architecture and provision applications. At the same time, many are demanding hyperscale and high-performance cloud providers to run AI and machine learning services.

The impact of quantum computing on PAM: Preparing for the future

Quantum computing is poised to revolutionize the world. From simulating atoms and molecules to mapping and modeling in medicine, the potential use cases are vast and still unfolding. It may seem far on the horizon, but for those in cybersecurity, especially privileged access management, now is the time to start planning.

PAM Essentials: A breakthrough in secure access solutions

We're excited to announce new capabilities of One Identity’s Cloud PAM Essentials, launched in March 2024, featuring our innovative Secure Gateway secure tunnel solution. This groundbreaking product offers a VPN-less solution designed to provide secure, seamless access to your critical resources. The journey from initiation to market release took just nine months, a testament to our team's dedication and efficiency.

Continuous Threat Exposure Management (CTEM): A new era in proactive cyber defense

Do we need a new cybersecurity framework? According to Gartner, the answer is yes. Since 2022, they have championed CTEM, a five-stage approach designed to shrink attack surfaces and minimize cyber threat exposure through continuous risk assessment and mitigation. At its core, CTEM advocates for regularly testing your defenses to find vulnerabilities in your system and fortify your organization’s security with risk mitigation strategies.

Mastering modern access control with RBAC and ABAC

Managing access to resources efficiently and securely within today’s complex IT environments is paramount. Two prominent access control models, Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), play crucial roles in this endeavor. Understanding their relationship and how they can be integrated is essential for optimizing security and operational efficiency.

Unlocking the potential of machine identities: A Glimpse into One Identity's Unified Identity Platform future

Machine identities are growing faster than human identities, with a growth rate of 10 to 45 times higher. This complexity is compounded as more organizations adopt multi-cloud and hybrid strategies, a trend forecasted to continue through 2024. There’s also the rise in endpoints, as more machines become IoT-connected, leading to widening attack surfaces.

Securing non-human identities in hybrid environments

Securing non-human identities is just as critical as managing human ones in today's complex IT landscapes. Non-human identities, such as service accounts, application identities, and IoT devices, play pivotal roles in automation and system integration. Managing these identities in hybrid environments, where on-premises Active Directory (AD) integrates with cloud-based Entra ID (formerly Azure AD), presents unique challenges.