Technology that powers the new era of workforce flexibility
These search results are from across the Techday network of sites
One Identity reaches out to SolarWinds customers following breach
According to the company, this free assessment seeks to help organisations navigate through times of uncertainty as attacks continue to grow in sophistication and complexity across the broad range of identity-centric risks.
Survey reveals A/NZ sentiments toward remote working and impact of COVID-19
"Employees, IT and security teams are all working to adapt and respond to the challenges of providing effective processes for gaining access to the resources needed for the workforce to do their jobs and security challenges associated with this new working environment.”
One Identity & Ping Identity join forces on identity management
The partnership brings together Ping Identity's access management technology with One Identity’s identity governance and administration (IGA) technology.
One Identity boosts database security with Microsoft SQL Server support
One Identity has announced its One Identity Safeguard solution now supports Microsoft SQL Server 2017 and SQL Server 2019 database environments.
Businesses unsure if they’ve experienced Pass the Hash attacks – One Identity
A PtH attack is when an attacker compromises an end-user’s machine and simulates an IT problem so that a privileged account holder will log into an administrative system.
One Identity solution achieves new SAP certification
Customers can benefit from improved interoperability with SAP applications and with the large ecosystem of solutions that run on SAP NetWeaver.
One Identity: How to mitigate the risks of spearphishing
Targeting one company rather than casting a wide net allows threat actors to take a more sophisticated approach.
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
How to optimise the performance of SIEMs
Optimising your SIEM is most easily and effectively done by also optimising your log management.
Interview: Why log management is crucial to modern business
One Identity's IT veteran Balázs Scheidler shares his insights on log management's history and where it's going to next.
One Identity launches authentication services for Unix systems
Unix systems (including Linux and Mac OS), by their very nature, have distinct challenges when it comes to security and administration.
Two top execs’ predictions for cybersecurity in 2019
One Identity and Secureworks executives Alex Tilley and Serkan Cetin have released what they see coming for cybersecurity in 2019.
Exclusive: Three access management learnings from 2018
There was a renewed global response to data security in 2018, placing pressure on organisations to assume more responsibility for the data they hold.
One Identity a Visionary in Magic Quad for PAM
One Identity was recognised in the Gartner Magic Quadrant for Privileged Access Management for completeness of vision and ability to execute.
Organisations still can’t get access management right - One Identity
These and other findings paint a bleak picture of how many organisations approach IAM and PAM programs.
Making biometric technology more secure – One Identity
There are distinct security advantages to using something that’s a unique part of the user, rather than something they must recall from memory.
Exclusive: Measurement key to successful identity governance implementation
Access management is about providing a frictionless operating environment to lead business growth while reducing a business’s exposure to risk.
Interview: Unravelling the myths of chatbot security and identity theft in banking
“People shouldn’t be worried about internet banking. They should be worried about what information they’re giving people who can impersonate them.
Guardians of data: Who watches over our information
Controlling who has access to certain information is a necessity in today’s business world.
Widespread mismanagement of privileged accounts and access revealed in global survey
These findings are significant considering that privileged accounts grant access to nearly every component of a company’s IT infrastructure.
Singapore, Aus employees admit to snooping around corporate networks
Employees in Singapore, Australia and across the globe snoop their employer’s networks to seek information they are not permitted to access.
Dormant employee accounts a major cyber risk for Singapore businesses
Only seven percent of respondents in Singapore say they remove access for users immediately upon a change in HR status.
Diving into the magic of two-factor authentication
More effective privileged account management can also greatly mitigate risk and reduce the exposure surface for businesses.
Mitigating identity-related risks: The complete package or a one-man show?
Think of behaviour analytics as Iron Man and identity analytics as The Avengers and you have a powerful approach to identity access management.