Articles By: One Identity

Peer Paper Review: 10 Best Practices for Managing and Securing Microsoft Active Directory in an Evolving IT World
Identity and Access Management (IAM) programs reliably center around Microsoft Active Directory (AD) and Azure AD (AAD) as their foundation.

KuppingerCole White Paper: Enhanced Privilege Access Management Solutions
PAM is critical to mitigating risk and securing your organization. Keeping up with the rapid pace of change is difficult. But it’s impossible to ignore the fact that PAM solutions need an updated set of capabilities to combat today’s threats and to meet compliance needs.

How to Approach the Complexity of an Identity Management & Governance Program
Most of the challenges we face with security, and IAM in particular, are based on the diversity of the systems that must be controlled, the complexity of the disparate solutions put in place to secure access to those diverse systems, and the constantly shifting landscape of users and the ways those users choose to access those systems.

Security Starts Here – Active Directory Account Lifecycle Management
Managing Active Directory (AD) and Azure AD accounts, objects and groups is a cumbersome and error-prone task. Often this task creates a barrier to achieving more advanced objectives, such as identity governance and administration (IGA).

Making Zero Trust Real
Establishing zero trust and least privileged access is key to securing privileged accounts. One Identity provides a holistic approach to implementing privileged access management (PAM) with these two proven methods. The Zero Trust model involves eliminating shared admin passwords and so that every administrative action is authenticated uniquely, dynamically and specifically.

Zero Trust and Privileged Security for Hybrid AD
Learn How Zero Trust and Least Privilege Can Secure Access to Your Critical Resources. With the majority of large corporations using Active Directory (AD) and Azure AD to control user permissions and access, it is one of first places attackers look for weakness.

IT Services Firm Enahances UNIX Security While Simplifying Management
SMB clients delivered enterprise-level support with Privileged Access Suite for UNIX.

Authentication Services Single Sign-on for SAP
SAP® applications deliver a lot of value to organizations—but they also add to password management headaches. On top of the passwords they already have, users have to remember and enter an additional password for each SAP application they need to do their jobs—which hurtsproductivity, increases calls to the help desk and invites security risks.