Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

White Paper | Presented by One Identity

Authentication Services Single Sign-on for SAP®

For many organizations, SAP applications and services are mission-critical. However, SAP applications often must meet strict standards demanded by Regulatory compliance, internal controls and corporate best practices. Learn how One Identity™ Authentication Services Single Sign-on for SAP delivers true single sign-on for SAP enterprise-wide.

White Paper | Presented by One Identity

Controlling and Managing Super user Access.

Security and compliance are driving forces behind many IT initiatives. That makes controlling and managing privileged access a high priority for any IT team. Yet, as vital as it is to effectively manage privileged accounts, native tools and manual practices aren’t good enough in today’s complex heterogeneous environments. What’s needed is a much more deliberate approach to privileged account management.

eBook | Presented by One Identity

Future-Ready Identity and Access Management

This e-book offers five fundamentals to help you find a new approach to identity access and management (IAM) security. Implement a future-ready approach to IAM that will address your immediate user access challenges while also preparing you to deal with what comes next - even if you don't know what that is.

White Paper | Presented by One Identity

How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Identity Governance and Access Management

This paper addresses this area of IT security compliance from an auditor’s perspective for the Sarbanes-Oxley Act (SOX). Although SOX represents only a portion of the total scope of internal control obligations faced by most organizations, it is a critical piece of the compliance challenge, and the solutions recommended here for SOX compliance will help your organization achieve and demonstrate compliance with other security mandates as well.

eBook | Presented by One Identity

Identity Analytics - A more comprehensive defense in the battle to reduce risk and enhance security

Almost every company has instances of users who have inappropriate entitlements because they are improperly provisioned or because they change roles and the old permissions are not de-provisioned. There's a great deal of risk associated with inappropriate or excessive rights, and bad actors love to exploit this. IT security teams must take a more proactive stance to reduce identity-related risk. Now they can.

Video/Webcast | Presented by One Identity

Innovate and Transform and Become the Next Uber or Amazon

View this on-demand webcast, to see how a leading-edge IAM solution can enable managers to easily define and enforce the policies of their governance initiatives, including those that are on-premises, hybrid and cloud to meet business demands today and in the future.

Is your organization prepared for GDPR?

The European Union’s General Data Protection Regulation (GDPR) will have a far-reaching impact. No matter where your organization is based, if you store or process personal information of EU citizens, you need to ensure your organization is ready.

White Paper | Presented by One Identity

IT services firm enhances UNIX security while simplifying management

Read how an IT services firm enhances UNIX security while simplifying management.

White Paper | Presented by One Identity

Regulating Privileged Access: Leveraging the Human Factor for Better Security

This paper examines how the use of Privileged Access Management (PAM) - specifically the management of privileged passwords ans sessions- and human approval can augment an organization's security stance around the use of privileged accounts.

White Paper | Presented by One Identity

Securely Managing Your UNIX Environment

UNIX systems face special identity and access management (IAM) challenges. This white paper details those challenges and explains how they can be overcome with the right practices and the right tools, enabling you to enhance security, achieve compliance, and dramatically improve operational efficiency.

Load More