Hi [[ session.user.profile.firstName ]]

OneLogin

  • Date
  • Rating
  • Views
  • The Critical Steps to Deploying MFA at Enterprise Scale Without Regrets
    The Critical Steps to Deploying MFA at Enterprise Scale Without Regrets Jeffrey Broberg, Sr. Director, Mobile Product Management; OneLogin, Michael Gleason, Sr. Manager, Product Marketing; OneLogin Recorded: Jun 21 2018 53 mins
    You know 81% of hacking-related breaches involve stolen or weak credentials (Verizon Data Breach Investigation Report, Verizon, 2017). You know your users are targeted by more phishing attacks than ever before. You even know Multi-Factor Authentication (MFA) is your best weapon in defending against cybercrime.

    But how do you wrap your head around an MFA project at enterprise scale? What product capabilities are essential? And how do you cut down on the time it takes to scope, deploy, and operationalize a solution?

    Join Jeffrey Broberg, Sr. Director of Mobile Product Management at OneLogin and Michael Gleason, Sr. Manager, Product Marketing at OneLogin for a webinar where you will learn:

    - Why a successful MFA deployment represents the ultimate effort-to-impact security project
    - Why choosing an Identity Provider with built-in MFA functionality is the ultimate IT + Security twofer
    - How to smash the security vs. productivity paradigm with dynamic authentication
    - How to deploy and operationalize in hours or day instead of months by deploying MFA in front of your Single Sign-On (SSO) solution
  • HR-driven Identity Management with Stitch Fix and OneLogin
    HR-driven Identity Management with Stitch Fix and OneLogin Ravindra Sunku, Director of IT, Stitch Fix, James Herbert, Solutions Engineer, OneLogin Recorded: Jun 6 2018 31 mins
    Learn how to integrate your HRIS and Identity Management platform to streamline onboarding and offboarding, automate user management and drive efficiency.

    Hear how a small IT and HR team at Stitch Fix collaborated to design and implement a best of breed solution with Workday HCM and OneLogin in a highly complex, fast-growth environment with thousands of remote and seasonal users while saving hundreds of thousands of dollars per year.

    Watch this webinar to learn:

    - Best practices for integrating Workday with your identity toolset
    - How IAM integration and automation drive user engagement with Workday - - - HCM as the single source of truth for corporate HR data
    - How a pleasant onboarding experience enables rapid productivity with ongoing provisioning savings
    - How HR-driven identity is well suited for Retail environments with seasonal rehires
  • Securing Access to On-prem and SaaS Environments with Cloud Based IAM
    Securing Access to On-prem and SaaS Environments with Cloud Based IAM Merritt Maxim, Senior Forrester Analyst, Forrester Research Recorded: May 31 2018 51 mins
    Despite the rapid enterprise adoption of SaaS, many organizations still rely on a hybrid mix of on-premise and SaaS apps to run their business, creating administrative challenges and inefficiencies.

    Identity-as-a-service (IDaaS) solutions have evolved to provide business and security professionals with a viable and compelling alternative to traditional IAM options. Besides delivering all the great cloud benefits, cloud-based IAM offerings can integrate with on-premise environments to increase business agility, reduce operational inefficiencies, mitigate identity risks, and improve real-time visibility for today's hybrid enterprise.

    Join featured speaker Merritt Maxim, Senior Analyst at Forrester Research, as he discusses the state of IDaaS in the context of new architectures and real world use-cases, including:

    – Current IDaaS Market Trends
    – Critical considerations for building an IDaaS architecture & strategy
    – Challenges in extending on-premises
    – IAM approaches to the cloud
    – Key benefits from deploying IDaaS in hybrid environment
    – Quick Demo of OneLogin IDaaS solution for hybrid environment
  • Mastering AWS IAM: Using Automation to Secure Access to AWS
    Mastering AWS IAM: Using Automation to Secure Access to AWS Scott Ward, Solutions Architect, AWS, Nathan Chan, Solutions Architect, OneLogin, Jonathan Bennun, PMM, OneLogin Recorded: May 17 2018 60 mins
    For many companies, Amazon Web Services is the foundation of their software apps, containing valuable software code that is critical to protect. Join us to learn about mistakes to avoid when using AWS Identity and Access Management (IAM) - and how to address them.

    AWS solution architect will touch on Federated Users, Trust & Access Policies and AWS Organizations, and you’ll see a demo of how to set up a secure OneLogin+AWS deployment.

    In this webinar you will learn:

    - IAM misconfigurations made by AWS customers
    - Best practices for AWS access security
    - How to extend AWS IAM security using SAML integration, Multi-Factor Authentication, and AWS Roles
    - How to get your own Free OneLogin for AWS Account
  • How to Harden Your MFA with Machine Learning
    How to Harden Your MFA with Machine Learning Merritt Maxim, Senior Forrester Analyst, Forrester Research, Al Sargent, Sr. Product Marketing Director, OneLogin Recorded: Apr 19 2018 57 mins
    For security teams who need to reduce the risk of account takeovers, static multi-factor authentication (MFA) is a thing of the past for catching new security risks. Legacy MFA providers that use static rules miss high-risk login and miss security risks. Machine intelligence is now required to determine whether to prompt users for MFA using a broad set of inputs, including networks, geography, devices and time.

    Learn how to detect a broader set of attacks and strengthen your company’s security posture.

    In this learning session, OneLogin’s Al Sargent joins Forrester Senior Analyst, Merritt Maxim to dissect the current state of MFA and highlight the role of machine learning to advance the state of corporate security.
  • How to Reduce Data Breaches with Cloud-authenticated Laptops
    How to Reduce Data Breaches with Cloud-authenticated Laptops Maxim Merritt, Senior Forrester Analyst, Forrester Research, Al Sargent, Sr. Product Marketing Director, OneLogin Recorded: Apr 5 2018 61 mins
    Your company may be overlooking a big security gap. Despite the rapid adoption of SaaS or web applications by enterprises, many of them still rely on on-premises Active Directory (AD) to manage password policies and authenticate laptops.

    This approach worked in 2000 when every employee used a PC behind a firewall. Fast forward 17 years later, corporate laptops are used remotely and Macs and a flexible workforce of contractors are becoming common. Many of these laptops are excluded from corporate security policies password requirements. Once stolen or compromised, this leaves companies with widespread security gaps waiting to be exploited.

    Join OneLogin’s Al Sargent and guest speaker Forrester’s Senior Analyst, Merritt Maxim, as we discuss:

    - Today’s widespread security gaps and their economic impacts
    - A new approach to Identity and Access Management to manage security issue
    - Hardening enterprise’s endpoints while moving to the cloud, without disrupting existing identity architectures
  • Hybrid Access Management for both On-Prem and Cloud Apps
    Hybrid Access Management for both On-Prem and Cloud Apps Anil Goel, IAM Architect, Wipro, Gary Gwin, Director of Product, OneLogin Recorded: Mar 29 2018 61 mins
    If you work with legacy Web Access Management (WAM) products, you know what a pain they are. Policy server sprawl. Ancient code. Nightmarish support. Difficult upgrades. It doesn’t have to be like this.

    Watch this webinar to learn how they helped an established, 100-year-old enterprise implement an identity solution that integrates a wide range of on-premises and SaaS applications — fast, seamlessly, and securely.

    In this session, Wipro’s Anil Goel (IAM Architect) and Geetha Hari (Global IAM Solutions Lead) join forces with OneLogin’s Gary Gwin (Director of Product) to show how you can plan and execute your escape legacy WAM hell.
  • Myths & Realities of Multi-factor Authentication: The CISO Perspective
    Myths & Realities of Multi-factor Authentication: The CISO Perspective Stephen Lawton, Special Projects Editor, SC Magazine, Alvaro Hoyos, CISO, OneLogin Recorded: Mar 22 2018 33 mins
    Passwords alone won’t cut it in the days of sophisticated phishing, spoofed email and social engineering attacks. High-profile security breaches are making headlines weekly, and the number of incidents continues to rise. Multi-factor authentication (MFA) has become the go-to tactic to prevent malicious parties from accessing sensitive corporate data. While MFA provides undeniable value, conventional MFA solutions are difficult and time-consuming to implement with end-user usability implications.

    Watch this informative on-demand webcast hosted by SC Magazine featuring OneLogin’s, CISO, Alvaro Hoyo as we uncover the current state of MFA and the tangible security value it provides, plus key elements of a successful MFA strategy.
  • The Emergence of Unified Access Management
    The Emergence of Unified Access Management Garrett Bekker of 451 Research, Miles Kelly of OneLogin and Gary Gwin of OneLogin Recorded: Mar 19 2018 40 mins
    Today, the vast majority of organizations struggle to manage complex application environments consisting of a growing portfolio of SaaS applications as well as commercial off-the-shelf and custom web apps hosted on-premises, at remote data centers, and in private clouds. Organizations are further challenged to manage access to applications, networks, and devices for users stored in disparate directories.

    The Future of Access Management is here. Join 451 Research’s Sr. Analyst Garrett Bekker, OneLogin’s CMO Miles Kelly and Director of Product Gary Gwin as they unveil a new way to unify access to both SaaS and on-premises applications, as well as access to networks and devices, all with a single Identity-as-a-Service (IDaaS) solution.
  • How To Prepare for Intensifying Cyber Security Risks in 2017
    How To Prepare for Intensifying Cyber Security Risks in 2017 Andras Cser VP and Principal Analyst, Forester, Al Sargent Sr. Director Product Marketing, OneLogin Recorded: Dec 15 2016 58 mins
    Applications are under siege, and successful application attacks are the source of the biggest data loss. While there isn't an "easy" button for cyber security, there are some proven initiatives security professionals can take to ensure employees can seamlessly access the right applications - while keeping corporate data secure.

    Join guest speaker, Andras Cser from Forrester and OneLogin as we discuss key predictions for 2017, and outline how you can automate secure access to your applications, laptops, and mobile devices in a rapidly evolving landscape. Don't miss the experience, without compromising security.

Embed in website or blog