• 24 Apr 2018

    ONE IDENTITY EMEA UNITE PARTNER AWARDS 2018

    One of the highlights of the One Identity EMEA UNITE Partner Conference in Nice was the Partner Celebration Dinner and One Identity EMEA Partner Awards 2018. There were fifteen awards presented by a number of guest presenters alongside Ian Sutherland (VP & GM Sales, One Identity, EMEA). Long-Term Partnership: Computacenter L- R : Ian Sutherland, One Identity; Shahriar Saravandi-Rad, Computacenter Computacenter...
    • 18 Apr 2018

    Container Deployment Scenarios Alleviate Complex Deployments

    Digital transformation is an unstoppable force pushing nearly every organization to modify the way they operate. Seeing the competition gain an edge by embracing cloud-based resources and services is driving businesses to become more agile. To keep up with the rapid pace of change, organizations need to deploy applications faster, and to reduce expenses incurred from running legacy application in a traditional manner...
    • 16 Apr 2018

    Better User Management Takes Flight

    Air travel companies experience extreme seasonal loads, taking on thousands of short-term staff as business increases, then releasing them during the quieter autumn and winter months. Dutch low-cost airline, Transavia, is no different. Founded in 1965 and now part of Air France-KLM, Transavia flies passengers to more than 110 destinations in Europe and North Africa, and according to Anders Kok, service delivery manager...
    • 11 Apr 2018

    Iso/Iec 27001 from an Auditor’s Perspective

    For many organizations, compliance with data security standards doesn't seem to be getting easier. With the myriad of regulations, it’s not easy to understand what each one of them are actually requiring you to do. You can get ahead of the game by understanding the regulations and learning what controls you can put in place to achieve compliance. Read our white paper where an auditor dissects ISO/IEC 27001...
    • 11 Apr 2018

    Fox, Box, Knox … Sox! Complying with Sox Can Be as Challenging as Trying to Quickly Read a Dr. Suess Book, but Both Are Worth the Challenge

    As a kid I always loved having my mom read me books by Dr. Suess, There’s a Wocket in My Pocket and The Sneetches being a few of my favorites. Now that I have children, I realize what challenging these books can be to read aloud. But if you can get through the challenging tongue twisters, the underlying themes often provide powerful messages. The same could be said of SOX compliance, it’s very challenging...
    • 2 Apr 2018

    Get Ready for RSA 2018

    Will you be in San Francisco April 16-20? One Identity sure will. One of the highlights of our year is the RSA Security Conference and 2018 is no different. As always, we’ll have a lot going on at the show and would love for you to stop by if you’re going to be in town. First and foremost among our activities is our booth in the North Hall (#3326 if you’re into that type of thing). We’ll be showing...
    • 29 Mar 2018

    Meet me in San Francisco

    The RSA Security conference is one of the main ways that I stay up to speed on all things security – and specifically identity and access management – related. Last year, I was honored to be chose to present in the main conference track and I’m humbled to be asked back for a second time this year. Here’s what I’ll be speaking about: Passwords & Fingerprints & Faces-Oh My! Comparing...
    • 21 Mar 2018

    Sneak Peek: One Identity EMEA UNITE Partner Conference in Nice, France – 9 -12 April 2018

    As the journey to IAM Success continues, One Identity UNITE Nice (France) starts Day 3 with choice. As One Identity has a broad range of IAM solutions, multiple technology tracks offer insightful overviews of: Identity Governance Access Management Privileged Access Management IDaaS – One Identity Starling This year, already we have had some very positive changes in the One Identity business, starting...
    • 21 Mar 2018

    Students no longer face delays in gaining access to the applications they need

    Abu Dhabi University automates access management with Identity Manager , giving new students and staff access to applications fast and helping to dramatically reduce help-desk enquiries. Abu Dhabi University is a thriving centre for higher education in the United Arab Emirates (UAE). It runs faculties for law, arts and sciences, engineering and business administration — all of which offer undergraduate and postgraduate...
    • 21 Mar 2018

    One Identity EMEA UNITE Partner Conference in Nice, France – 9 -12 April 2018

    As One Identity continues its journey to become an independent leading Identity and Access Management (IAM) solution provide, we are now UNITEing our customers and partner events into a unified, focused and collaborative event that spans four days – this time overlooking the Mediterranean Sea in NICE, France. To begin the UNITE event with our EMEA partners on Monday, we examine “The Journey to IAM Success”...
    • 16 Mar 2018

    So now you know what GDPR is … what’s next?

    As you’re painfully aware, GDPR (General Data Protection Regulation) requires any organization that stores, processes, or transmits personal data on European Union citizens (even organizations outside of the EU) to undertake “data protection by design” and “data protection by default” with regard to that information. A major component of the regulation is the requirement to report “...
    • 16 Mar 2018

    GDPR is upon us – are you ready?

    You’ve overcome organizational and reporting challenges from PCI, SOX, HIPAA, GLB and all the other alphabet-soup regulations. Now, here comes the European Union General Data Protection Regulation (GDPR), which applies to most of us, whether we like it or not – and it goes into effect on May 25, 2018. In general, GDPR aims to provide citizens of the EU with clear and understandable information with regard...
    • 14 Mar 2018

    Take your place in the growing One Identity Partner Circle

    What a year it has been, thanks to you, our partners. Since becoming an independent brand, One Identity has seen incredible growth in our Partner Circle Program. That growth is not just in the volume of sales (always important) by partner members – a 44-per cent increase in EMEA – but also in membership and the number of technical certifications achieved. Globally, we’ve had nearly 100 partners earn...
    • 14 Mar 2018

    Partner Circle Program delivers a way to overcome the four main challenges to security today

    As this is my first blog post at One Identity, I’d like to say thank you for the warm welcome from all the partners, customers and internal colleagues who have reached out since I took on my new role as director of channel and alliances for North America. I’m excited to be part of this seamless organization that extends from our offices to our partners and all the way to our end-user customers. I am particularly...
    • 14 Mar 2018

    2018 March Highlights

    Identity Analytics and Risk Intelligence: Group Nesting: Do you nest groups in Active Directory? Turns out...you're not alone! Group maintenance is an ongoing struggle in any active Active Directory environment. One...
    • 23 Feb 2018

    Privileged Access Doesn’t Have to Be All or Nothing

    One Identity Safeguard frees up processor manufacturer, Cavium to enter new markets securely The question of user access rights does not have to be one of all or nothing. As an IT leader at your organization, you can escape the binary choice of giving everyone access to everything or nothing at all. You can parse out access based on roles and responsibilities. This ability includes basic users who need access to printers...
    • 23 Feb 2018

    Help Improve the Design of One Identity Products

    Have you ever opened a software interface and didn’t have the slightest clue how to use it, or even worse, what it was for? The One Identity User Experience (UX) Team recognizes that the interfaces of our products are not immune to this. That is not acceptable. We desire to do better. We want to ensure that our products meet your needs in both form and function. In order to achieve this, we need your help. As...
    • 15 Feb 2018

    2018 February Highlights

    Identity Analytics and Risk Intelligence Privileged Password and Privileged Session Support: Another great milestone to draw attention to today. Let’s say you’re a smart cookie and you know you have a problem with ...
    • 13 Feb 2018

    Slaying the IAM Beast Is a Prerequisite for Successful Digital Transformation

    IAM programs should empower digital transformation, but organisations are at risk of being held back by mistakes from the past. Digital transformation is rapidly taking over boardroom agendas and giving businesses the tremendous challenge of reevaluating the way they operate. Many will need to rethink which markets to compete in and how to structure their business to stay competitive as we go through what the World...
    • 13 Feb 2018

    Measuring Identity Governance – Five practical steps

    It’s a fair assumption that you’re not measuring your organisation’s identity access governance (IAG). And, if you are, it’s likely to be via an indirect measure, such as the risk of data breaches. But first, let’s begin by defining the functional pillars of identity governance as privileged identity management, access management and identity lifecycle management. IAG is more than just...
    • 6 Feb 2018

    Cloud Access Manager and Microsoft Office 365: Five Things to Know

    Organizations in the process of migrating to Office 365, particularly those that run Active Directory in-house and leverage it to provide single-sign-on to Microsoft applications, quickly learn that moving to the cloud-based productivity suite means ...
    • 31 Jan 2018

    2018 January Highlights Part 2

    Identity Analytics and Risk Intelligence: New And Increased Risk Tracking: Collecting and highlighting risky entitlements is an ongoing operation. A schedule controls how often entitlements are collected and analyzed. As new ...
    • 29 Jan 2018

    How to Secure Confidential Attributes with Active Roles -Script Provided

    The Challenge The Challenge Active Roles Access Templates are a terrific way of delegating access to Active Directory. They make securing Active Directory both simpler and more powerful. Access Templates can secure Active Directory at the object,...
    • 24 Jan 2018

    Conquer the challenges of Office 365, Azure AD and Hybrid AD management

    Organizations are sprinting to Office 365 . In fact, users will have to convert by Oct. 13, 2020 as support for Office 2020 ceases that day. By then, many organizations will be 100-percent cloud, but most are so heavily invested in legacy infras...
    • 19 Jan 2018

    Telecommunications giant secures Active Directory

    (Please visit the site to view this video) As companies grow by acquisition and expand internationally, one of the natural by-products is a large and complex IT infrastructure. Such was the case with Telefónica España and its multi-domain use of Active Directory (AD). Telefónica España, one of the main companies in the Telefónica group - one of the biggest telecommunication companies...