Articles By: One Identity

Peer Paper Review: 10 Best Practices for Managing and Securing Microsoft Active Directory in an Evolving IT World

Identity and Access Management (IAM) programs reliably center around Microsoft Active Directory (AD) and Azure AD (AAD) as their foundation. However, as IAM environments move to the cloud, modernize and extend toward governance, IT managers are pained with security and efficiency gaps in native AD, and as such they seek solutions to augment the capabilities of AD which often fall […]

Read more ›

KuppingerCole White Paper: Enhanced Privilege Access Management Solutions

PAM is critical to mitigating risk and securing your organization. Keeping up with the rapid pace of change is difficult. But it’s impossible to ignore the fact that PAM solutions need an updated set of capabilities to combat today’s threats and to meet compliance needs. To help understand where most PAM solutions are today and where they need to go […]

Read more ›

How to Approach the Complexity of an Identity Management & Governance Program

Most of the challenges we face with security, and IAM in particular, are based on the diversity of the systems that must be controlled, the complexity of the disparate solutions put in place to secure access to those diverse systems, and the constantly shifting landscape of users and the ways those users choose to access those systems. In other words, […]

Read more ›

Security Starts Here – Active Directory Account Lifecycle Management

Managing Active Directory (AD) and Azure AD accounts, objects and groups is a cumbersome and error-prone task. Often this task creates a barrier to achieving more advanced objectives, such as identity governance and administration (IGA). Native tools are insufficient, manual processes are inefficient, and enterprise IAM solutions and their proprietary methods rarely make it easy to do what is right […]

Read more ›

Making Zero Trust Real

Establishing zero trust and least privileged access is key to securing privileged accounts. One Identity provides a holistic approach to implementing privileged access management (PAM) with these two proven methods. The Zero Trust model involves eliminating shared admin passwords and so that every administrative action is authenticated uniquely, dynamically and specifically. The Least Privilege approach involves delegating to give each […]

Read more ›

Zero Trust and Privileged Security for Hybrid AD

Learn How Zero Trust and Least Privilege Can Secure Access to Your Critical Resources. With the majority of large corporations using Active Directory (AD) and Azure AD to control user permissions and access, it is one of first places attackers look for weakness. And now that privileged access management (PAM) is a growing aspect of AD, it is becoming a […]

Read more ›

IT Services Firm Enahances UNIX Security While Simplifying Management

SMB clients delivered enterprise-level support with Privileged Access Suite for UNIX.

Read more ›

Authentication Services Single Sign-on for SAP

SAP® applications deliver a lot of value to organizations—but they also add to password management headaches. On top of the passwords they already have, users have to remember and enter an additional password for each SAP application they need to do their jobs—which hurtsproductivity, increases calls to the help desk and invites security risks. Having additional identity repositories to manage […]

Read more ›