All Research Sponsored By:One Identity

A Guide for Identity Governance and Administration Programs
WHITE PAPER: Organizations are rapidly accruing new digital identities, leading to a demand for more sophisticated identity security. This white paper presents a guide for IGA programs, showing you how to implement an IGA program from beginning to end. Download the guide now to learn more.
Posted: 01 Jun 2024 | Published: 01 Jun 2024

TOPICS:  .NET

4 Benefits of Just-In-Time (JIT) Privilege
WHITE PAPER: As the de facto authentication method for many enterprises, Active Directory (AD) is a consistent target for cybercriminals. Just-In-Time Privilege from One Identity is designed to protect within AD by removing access to those not currently using the privilege. Download this white paper to learn more about Just-In-Time Privilege.
Posted: 01 Jun 2024 | Published: 01 Jun 2024

TOPICS:  .NET

Top ten Reasons to Achieve Data Access Governance
EBOOK: It’s time to use a secure data governance strategy to protect your sensitive data and reduce risk. This e-book explores 10 reasons to adopt a data access governance strategy. Download now to learn more.
Posted: 31 May 2024 | Published: 31 May 2024

TOPICS:  .NET

Continuous Governance to Secure your Enterprise
EBOOK: Identities and access need to be managed in order to meet compliance standards and endure the long-term security of your organization. This e-book describes how your organization can achieve secure, continuous compliance through an identity governance framework. Read on to learn more.
Posted: 31 May 2024 | Published: 31 May 2024

TOPICS:  .NET

SAP GRC Framework Integration with One Identity Manager
WHITE PAPER: Built in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.
Posted: 30 May 2024 | Published: 30 May 2024

TOPICS:  .NET

How to Manage Unwanted guests in Azure Active Directory
WHITE PAPER: Guests in Azure Active Directory-controlled infrastructure need to be treated like the security threats they are. One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications and data essential to business. Read on to learn more.
Posted: 30 May 2024 | Published: 30 May 2024

TOPICS:  .NET

Stop Using Passwords
EBOOK: Most passwords are insecure, either being too easy to guess, or too readily shared.But what if your organization didn’t need passwords? Download this e-book to learn how a passwordless authentication platform works and see how it could reduce cyber risk in your organization.
Posted: 29 May 2024 | Published: 29 May 2024

TOPICS:  .NET

Access Management
ANALYST REPORT: Download this 7-chapter KuppingerCole report to gain a comprehensive understanding of the current access management market, including a compass to help you navigate vendor claims and choose the solution most suitable for your company.
Posted: 29 May 2024 | Published: 29 May 2024

TOPICS:  .NET

SAP Customer Stories
CASE STUDY: Modern employees expect to get access to the information they need anywhere and at any time. This case study compiles 6 stories of organizations that simplified IAM for SAP and other platforms with a certified solution from One Identity. Download now to learn more.
Posted: 24 May 2024 | Published: 24 May 2024

TOPICS:  .NET

Azure Active Directory vs. Classic AD
ESSENTIAL GUIDE: Jump into this E-Guide to find out how to pinpoint the differences between the Microsoft Azure edition of Active Directory and the classic Windows Active Directory – and how to use those differences to your enterprise's advantage.
Posted: 13 Mar 2019 | Published: 11 Mar 2019


Easy Active Directory Clean-Up Tips
ESSENTIAL GUIDE: Inside this E-Guide, read through some Active Directory organization strategies designed to minimize the headaches that often accompany user group restructuring projects – and ultimately reduce the time spent sifting through messy group architectures.
Posted: 13 Mar 2019 | Published: 11 Mar 2019


Go Back to the Basics with Active Directory
ESSENTIAL GUIDE: Despite your level of familiarity, it never hurts to keep up-to-date on basic Active Directory best practices. Inside this E-Guide, brush up on some basic Active Directory tips and tricks around domain controllers, cloud AD interactions, and more.
Posted: 12 Mar 2019 | Published: 11 Mar 2019


How Can Privileged Access Accounts Be Managed in Large Companies?
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017


How can organizations get control over privileged identity management?
EGUIDE: Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017


IAM for the Real World – Privileged Account Management
WHITE PAPER: Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012