Call us 

Discovering Identity and Access

Management Solutions

New Product Version Release Identity Manager 7.1.2

Post Image

New Product Version Release Identity Manager 7.1.2 One Identity is excited to announce a new version of Identity Manager is now available. Look what’s new: • Hyper Views for Azure Active Directory, Unix, Cloud System Management, and SAP R/3 • Support for Exchange Online as Target System • Various components specific enhancements and bug fixes […]

Read More

Get IAM Right – Insight Series with One Identity

Post Image

Get IAM Right – Insight Series with One Identity Join One Identity for our biweekly Insight Series of live webinars designed to help you Get IAM Right. Each webinar focuses on a specific area of identity and access management (IAM) and demonstrates real-world solutions that help you overcome the most common IAM challenges. Register for […]

Post Tagged with , ,
Read More

How does the Microsoft Authenticator application affect password use?

Post Image

How does the Microsoft Authenticator application affect password use? In an effort to reduce password usage, Microsoft introduced a new smartphone-based login feature for its Microsoft Authenticator application. How does this feature work, and can methods like this effectively eliminate passwords? Protecting passwords has always been a thorn in the side of security practitioners looking […]

Read More

How does Facebook’s Delegated Recovery enable account verification?

Post Image

How does Facebook’s Delegated Recovery enable account verification? Facebook introduced a new feature to improve password recovery that is designed to do away with security questions and email verifications. The protocol is called Delegated Recovery, and it somehow relies on other verification systems for third-party accounts. How does Facebook Delegated Recovery work, and could something […]

Read More

Has ForgeRock Betrayed Its Community?

Post Image

Has ForgeRock Betrayed Its Community? One of the fundamental freedoms open source is being able to change to another supplier if the original one stops being useful – overcharging, acquired by a toxic owner, development terminated, and so on. Forgerock is a company that used the open source freedoms of Sun’s identity management software to […]

Post Tagged with ,
Read More

The NotPetya Global Pandemic – CyberArk Labs Analysis

Post Image

The NotPetya Global Pandemic – CyberArk Labs Analysis In May 2017, WannaCry took advantage of an exploit in the Windows operating system to usher in a cyber security pandemic – ransomware that can spread its infection like a traditional worm. The results were catastrophic, with some damage estimates reaching up to more than $4 billion. […]

Post Tagged with ,
Read More

Okta Extends Canadian Presence with New Downtown Toronto Office

Post Image

Okta Extends Canadian Presence with New Downtown Toronto Office Okta, Inc., the leading independent provider of identity for the enterprise, today announced the opening of its new Canadian office in downtown Toronto. With the new office, Okta will tap into the area’s diverse high-technology talent pool to grow its engineering team, and create proximity to […]

Post Tagged with ,
Read More

Four identity management strategy pitfalls to avoid

Post Image

Four identity management strategy pitfalls to avoid When drawing up an identity management strategy, it’s important to keep in mind some common mistakes. The University of Oklahoma rolled out identity management software and multifactor authentication to protect important apps and data for 37,000 students and 12,000 employees over the last two and a half years. […]

Post Tagged with ,
Read More

Five Ways Identity Reduces Costs to Healthcare Providers

Post Image

Five Ways Identity Reduces Costs to Healthcare Providers Identity governance also offers a powerful value proposition to providers in the form of cost reduction. This is especially appealing when you consider that U.S. hospitals earn on average single-digit margins (Chart A). The American Hospital Association further reports that many providers operate in the negative. Through […]

Post Tagged with , , ,
Read More

Multi-Factor Authentication with Oracle Identity Cloud Services

Post Image

Multi-Factor Authentication with Oracle Identity Cloud Services The Multi-Factor Authentication part I post described the initial MFA configuration, the enrollment process and second factor authentication with the Mobile Authenticator One-Time Password. In this second post, we will go over the other factors: security questions, notifications, text messages and bypass code – and the additional security […]

Post Tagged with ,
Read More