Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

Video/Webcast | Presented by One Identity

Identity analytics - a more collective defense

When it comes to reducing identity-related risks, identity analytics is a logical addition to an organization's larger IAM arsenal. Solutions have been primarily focused on the area of behavior analytics - i.e., looking at what type of behavior occurred and the reasoning behind this behavior. However, they should also be focused on identity analytics and reducing risk before bad behavior impacts the business.

eBook | Presented by One Identity

Identity Analytics - A more comprehensive defense in the battle to reduce risk and enhance security

Almost every company has instances of users who have inappropriate entitlements because they are improperly provisioned or because they change roles and the old permissions are not de-provisioned. There's a great deal of risk associated with inappropriate or excessive rights, and bad actors love to exploit this. IT security teams must take a more proactive stance to reduce identity-related risk. Now they can.

Video/Webcast | Presented by One Identity

Top 5 Ways for Analyzing Entitlements and Identifying High-Risk

There's a great deal of risk associated with inappropriate or excessive rights, and when bad actors get into your network, they love to exploit these over-permissioned accounts. Identity analytics enhances your existing IAM investment by providing a comprehensive defense for your battle to reduce risk and enhance security.

White Paper | Presented by One Identity

Authentication Services Single Sign-on for SAP

For many organizations, SAP applications and services are mission-critical. However, SAP applications often must meet strict standards demanded by Regulatory compliance, internal controls and corporate best practices. Learn how One Identity™ Authentication Services Single Sign-on for SAP delivers true single sign-on for SAP enterprise-wide.

White Paper | Presented by One Identity

Bakersfield Police Department locks down remote access with Defender

To increase security of mobile computing devices used by the city's police department and other field personnel, as well as comply with federal requirements to provide secure remote access, The City of Bakersfield implemented Defender to enable two-factor authentication and to comply with the U.S. Department of Justice requirements.

White Paper | Presented by One Identity

City of Frankfurt work life realignment for local authority staff

Authority in Frankfurt enables flexible working hours and homeworking with the help of secure and user-friendly two-factor authentication software

White Paper | Presented by One Identity

Defender - The Right Way to Prove Identity and Establish Trust

This paper explains how you can prove the identity of the other party in an e-transaction or exchange of information. It also describes why Defender is an excellent solution to help you accomplish this. Seamlessly integrated with Microsoft's Active Directory, Defender offers a truly extensible architecture that is capable of scaling to fit your business needs.

eBook | Presented by One Identity

Future-Proof Your Tactical IAM Projects.

This e-book offers five fundamentals to help you find a new approach to identity access and management (IAM) security. Implement a future-ready approach to IAM that will address your immediate user access challenges while also preparing you to deal with what comes next - even if you don't know what that is.

eBook | Presented by One Identity

Future-Ready Identity and Access Management

This e-book offers five fundamentals to help you find a new approach to identity access and management (IAM) security. Implement a future-ready approach to IAM that will address your immediate user access challenges while also preparing you to deal with what comes next - even if you don't know what that is.

eBook | Presented by One Identity

IAM for the Real World Access Management

Access is usually the highest priority when taking on IAM challenges, but how do you do it most effectively? In this e-book, you'll discover: today's key challenges for effective access management; the most common identity administration principles; the significant benefits that can come from getting to one identity.

Load More