Technology that powers the new era of workforce flexibility
Login
Register
Search
Results:
One Identity
These search results are from across the Techday network of sites
Yesterday
One Identity reaches out to SolarWinds customers following breach
According to the company, this free assessment seeks to help organisations navigate through times of uncertainty as attacks continue to grow in sophistication and complexity across the broad range of identity-centric risks.
More
04 Nov
Survey reveals A/NZ sentiments toward remote working and impact of COVID-19
"Employees, IT and security teams are all working to adapt and respond to the challenges of providing effective processes for gaining access to the resources needed for the workforce to do their jobs and security challenges associated with this new working environment.”
More
03 Aug
One Identity & Ping Identity join forces on identity management
The partnership brings together Ping Identity's access management technology with One Identity’s identity governance and administration (IGA) technology.
More
04 May
One Identity boosts database security with Microsoft SQL Server support
One Identity has announced its One Identity Safeguard solution now supports Microsoft SQL Server 2017 and SQL Server 2019 database environments.
More
14 Oct
Businesses unsure if they’ve experienced Pass the Hash attacks – One Identity
A PtH attack is when an attacker compromises an end-user’s machine and simulates an IT problem so that a privileged account holder will log into an administrative system.
More
10 Jul
One Identity solution achieves new SAP certification
Customers can benefit from improved interoperability with SAP applications and with the large ecosystem of solutions that run on SAP NetWeaver.
More
14 Jun
One Identity: How to mitigate the risks of spearphishing
Targeting one company rather than casting a wide net allows threat actors to take a more sophisticated approach.
More
22 May
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
More
11 Mar
How to optimise the performance of SIEMs
Optimising your SIEM is most easily and effectively done by also optimising your log management.
More
08 Mar
Interview: Why log management is crucial to modern business
One Identity's IT veteran Balázs Scheidler shares his insights on log management's history and where it's going to next.
More
26 Feb
One Identity launches authentication services for Unix systems
Unix systems (including Linux and Mac OS), by their very nature, have distinct challenges when it comes to security and administration.
More
01 Jan
Two top execs’ predictions for cybersecurity in 2019
One Identity and Secureworks executives Alex Tilley and Serkan Cetin have released what they see coming for cybersecurity in 2019.
More
18 Dec
Exclusive: Three access management learnings from 2018
There was a renewed global response to data security in 2018, placing pressure on organisations to assume more responsibility for the data they hold.
More
12 Dec
One Identity a Visionary in Magic Quad for PAM
One Identity was recognised in the Gartner Magic Quadrant for Privileged Access Management for completeness of vision and ability to execute.
More
10 Oct
Organisations still can’t get access management right - One Identity
These and other findings paint a bleak picture of how many organisations approach IAM and PAM programs.
More
03 Oct
Making biometric technology more secure – One Identity
There are distinct security advantages to using something that’s a unique part of the user, rather than something they must recall from memory.
More
07 Aug
Exclusive: Measurement key to successful identity governance implementation
Access management is about providing a frictionless operating environment to lead business growth while reducing a business’s exposure to risk.
More
05 Mar
Interview: Unravelling the myths of chatbot security and identity theft in banking
“People shouldn’t be worried about internet banking. They should be worried about what information they’re giving people who can impersonate them.
More
13 Dec
Guardians of data: Who watches over our information
Controlling who has access to certain information is a necessity in today’s business world.
More
17 Nov
Widespread mismanagement of privileged accounts and access revealed in global survey
These findings are significant considering that privileged accounts grant access to nearly every component of a company’s IT infrastructure.
More
24 Oct
Singapore, Aus employees admit to snooping around corporate networks
Employees in Singapore, Australia and across the globe snoop their employer’s networks to seek information they are not permitted to access.
More
09 Oct
Dormant employee accounts a major cyber risk for Singapore businesses
Only seven percent of respondents in Singapore say they remove access for users immediately upon a change in HR status.
More
02 Oct
Diving into the magic of two-factor authentication
More effective privileged account management can also greatly mitigate risk and reduce the exposure surface for businesses.
More
05 Jul
Mitigating identity-related risks: The complete package or a one-man show?
Think of behaviour analytics as Iron Man and identity analytics as The Avengers and you have a powerful approach to identity access management.
More
1
2
Next ›
Last »