ConductorOne is now C1

Blog

Insights on identity security, access governance, and modern IGA.

  • Crawl, Walk, Run: Solving Your Identity Crisis
    • C1 Perspectives

    Crawl, Walk, Run: Solving Your Identity Crisis

    ·Claire McKenna
    Managing identity security is increasingly complex, with blind spots, over-permissioned users, and the rise of non-human identities. A crawl, walk, run approach helps organizations gain visibility and automate identity governance for stronger security.
  • One platform, Every Identity: Announcing Unified Identity Governance for Human and Non-Human Identities
    • COMPANY

    One platform, Every Identity: Announcing Unified Identity Governance for Human and Non-Human Identities

    ·Brittany Smail
    Announcing Non-Human Identity Governance, a new suite of capabilities that allow C1 customers to inventory, manage, and secure NHIs and AI agents. Govern every identity—human, machine, or AI—from one unified platform.
  • Some Like It Hot: IGA Hits the Big Time
    • C1 Perspectives

    Some Like It Hot: IGA Hits the Big Time

    ·Greg Howard
    This is an amazing time to be part of the identity landscape. Long ignored, identity is now seen as foundational to security — and companies are catching on, as evidenced by C1's incredible past year and the success for other identity vendors in the market. Read on to learn why everyone is suddenly embracing identity.
  • CMMC: What Is It and How to Comply Using Modern Identity Governance
    • Insights

    CMMC: What Is It and How to Comply Using Modern Identity Governance

    ·Brittany Smail
    As of December 2024, all contractors and subcontractors working with the US Department of Defense must comply with the Cybersecurity Maturity Model Certification (CMMC) program to protect sensitive government information. Learn more about the CMMC and how to meet its core identity-related requirements.
  • Introducing Auditor-Ready Data Accuracy Reporting
    • Company

    Introducing Auditor-Ready Data Accuracy Reporting

    ·Brittany Smail
    Announcing auditor-ready data accuracy reporting — a new feature that makes proving accuracy for access reviews simple and automatic.
  • The NIS2 Directive: What to Know and What It Means for Identity Security
    • Insights

    The NIS2 Directive: What to Know and What It Means for Identity Security

    As of October 2024, all EU member states are required to have laws enforcing the NIS2 Directive, a cybersecurity framework aimed at protecting Europe’s critical infrastructure and services from cyberattack. Learn about NIS2, whether your business needs to comply, and best practices for meeting NIS2’s core identity security requirements.
  • Designing a Great User Experience
    • Insights

    Designing a Great User Experience

    ·Brittany Smail
    As we continue to add new features and deeper capabilities to C1, our product designers and software engineers have the challenging task of making the platform even simpler and more intuitive to use. Learn all about their approach to UI design and check out our latest UI updates!
  • Closing the Door on Group Sprawl: Lessons from Spotnana's Security Journey
    • What's New

    Closing the Door on Group Sprawl: Lessons from Spotnana's Security Journey

    ·Greg Howard
    Group sprawl is real—and a major security concern for today's companies. In our latest webinar, Ben Godard, Head of Security at Spotnana, covered the risks created by groups and how to solve them. Here are the takeaways!
  • Announcing Identity Lifecycle Management
    • Company

    Announcing Identity Lifecycle Management

    ·Marissa Endres
    Introducing identity lifecycle management, a new solution from C1 that automates access provisioning and deprovisioning for joiner, mover, and leaver workflows.