Articles By: One Identity

Is Biometrics the Future of Security?

According to the National Academies Press, “biometrics is the automated recognition of individuals based on their behavioral and biological characteristics.” Read this white paper to learn more about Behavioral Biometrics and its role in security.

Read more ›

Providing the Right Privileged Access to Get the Job Done

The majority of headlines about cybersecurity failures center on the theft or loss of customer or citizen information, and larceny linked to money. However, for many organizations the “crown jewels” that they must protect is the intellectual property that is the true value of their businesses. Such is the case with San Jose, California-based Cavium, a processor manufacturer that services […]

Read more ›

Strategies for Successfully Managing Privileged Accounts

Getting identity and access management (IAM) right for your standard users is hard enough. What about your superusers? Privileged accounts and users with elevated access have unique requirements that often push management and governance beyond the reach of traditional methods for privileged account management (PAM). This e-book will arm you with questions and perspectives you can use to put in […]

Read more ›

Identity and Access Management for the Real World: Privileged Account Management

Much of the focus of identity and access management (IAM) is concerned with easy and unobstructed access to a large population of end users with minimal disruption to IT operations. But the forgotten arm of IAM—the silent killer. Read this white paper for essential information on the common security issues with privileged account management, and how you can minimize or […]

Read more ›

10 steps to Cleaning Up Active Directory

In this document, I provide 10 steps that you can take to remediate user account problems in AD and to prevent them from occurring in the future. These steps use native AD features and common workflow technology such as Microsoft SharePoint, so no significant prerequisites will hinder your ability to implement my recommendations.

Read more ›

Identity and Access Management for the Real World: Access Management

Access is usually the highest priority when taking on IAM challenges, but how do you do it most effectively? In this e-book, you’ll discover: today’s key challenges for effective access management; the most common identity administration principles; the significant benefits that can come from getting to one identity.

Read more ›