• /images/c1-perspectives-purple.png

    The Power of Policies in C1

    ·
    Claire McKenna
    Discover how ConductorOne’s flexible, layered policies automate access reviews, approvals, and least privilege at enterprise scale.
  • /images/lp-is-dead-blog.png

    Moving Beyond Least Privilege

    ·
    Kevin Paige
    Least privilege has long been security’s holy grail—but in today’s world of app sprawl, AI agents, and constant change, it’s broken. Learn why zero standing access is the future, with just-in-time provisioning, step-up approvals, and full auditability.
  • /images/ai-in-iga-blog.png

    From Manual to Intelligent: Using AI to Mature Your IGA Program

    ·
    Claire McKenna
    See how AI can mature your identity governance and administration (IGA) program. ConductorOne’s AI agent Thomas automates approvals, access reviews, and policy enforcement, while Copilot, an interactive assistant, streamlines workflows, surfaces risk insights, and guides smarter decisions. Scale governance for human and non-human identities, reduce IT overhead, and enforce least privilege at enterprise scale.
  • /images/company.jpg

    How Treasure Data Transformed User Access Reviews with ConductorOne

    ·
    Claire McKenna
    Discover how Treasure Data transformed its user access review program from manual spreadsheets to intelligent, continuous reviews with ConductorOne—cutting 160+ hours annually, expanding scope, and achieving meaningful security outcomes beyond compliance.
  • /images/c1-perspectives-1.png

    Simplify Onboarding with Automated Account Provisioning

    ·
    Mallory Surpless
    Automate and streamline employee onboarding with ConductorOne, delivering instant birthright access, seamless account provisioning, and a frictionless first-day experience.
  • /images/c1-perspectives-1.jpg

    IT’s Silent Assassin: How to Handle Ninja SaaS

    ·
    Chayce O'Neal
    Learn how to spot and manage Ninja SaaS, unauthorized apps that quietly enter your environment, before they turn into costly security and compliance risks.
  • /images/checking-the-box-1.jpg

    Beyond Checking the Box: How to Use UARs for Real Security

    ·
    Marcus Whitaker
    Most companies treat user access reviews (UARs) as a compliance checkbox, but that’s a missed opportunity. This blog explores how leading security teams use UARs to reduce risk, eliminate unused access, and enforce policies more effectively, with real-world examples you can implement today.
  • /images/kevin-blogpost.jpg

    Identity Governance vs. SaaS Management Solutions

    ·
    Kevin Paige
    Many teams confuse SaaS management tools with identity governance platforms, but they solve entirely different problems. Learn why SMPs can’t secure your business and what it really takes to manage access risk.
  • /images/baton.jpg

    Managing Identity for SQL-Powered Apps: No APIs Necessary

    ·
    Justin Gallardo
    Discover how Baton-SQL helps organizations integrate legacy and homegrown applications into their identity governance programs, no APIs or custom code required. Learn how our open-source connector enables fast, scalable access to identity and access data directly from any SQL database.