Hi [[ session.user.profile.firstName ]]

Centrify - EMEA webinar channel

  • Date
  • Rating
  • Views
  • Simplify and Accelerate Your GDPR Compliance Efforts
    Simplify and Accelerate Your GDPR Compliance Efforts Tm Hill, Director of Product Management and Strategy Recorded: Mar 13 2018 30 mins
    As we’re all aware, GDPR will be enforced starting May 25th, 2018 and organisations should understand which aspects of its preparations will be in place before the deadline.

    Much like other technological shifts of the last decade —GDPR will change the way our organisation handles personal data. GDPR will require organisations to implement specific, defined controls over the handling of collected personal data, with the primary objective of streamlining data security regulations and bolstering data protection in the face of a fast-evolving technology landscape.

    Tim Hill, Director of Product Management and Strategy from Centrify, discusses best practices around frameworks and architectures needed to ensure better business process and data management.

    Tim will also cover how organisations with a strong IAM strategy in place are more likely to provide better notification and more openness if and when data has been compromised.

    Listen to this webinar and learn:

    - Key elements to consider as the deadline for GDPR approaches
    - How a strong IAM strategy enables organisations to quickly identify whose data they are responsible for and where its stored.
    - How Centrify’s Zero Trust approach to IAM can help you prepare for GDPR’s underlying policy goals.
  • Rethink Your Approach to Enterprise Security Zero Trust Update with Tom Kemp
    Rethink Your Approach to Enterprise Security Zero Trust Update with Tom Kemp Tom Kemp, Co-founder & Chief Executive Officer, Centrify Recorded: Mar 13 2018 54 mins
    As today’s attacks become more sophisticated, the pressure to protect enterprise systems and data has grown considerably. Unlike the traditional security perimeter model, a Zero Trust approach dispels the notion of a robust firewall as the primary mechanism for protecting sensitive data. Zero Trust recognizes that any network, device, user or application could be compromised. As such, IT departments need to adjust their mindset and adopt a new way of thinking that bad actors are already in their environment in order to better protect sensitive company resources. Join Tom Kemp, Centrify CEO, to hear how identity has become the hub of any Zero Trust framework, and discover several guiding principles to help achieve a Zero Trust implementation.

    Centrify’s CEO, Tom Kemp will also discuss:
    •Centrify’s Identity platform that enables capabilities in achieving Zero Trust security
    •Steps for a company to jump start Zero Trust strategies
  • 5 Tips to Zero Trust Security
    5 Tips to Zero Trust Security Corey Williams, Senior Director of Product Management and Marketing, Centrify Recorded: Feb 27 2018 57 mins
    Cybersecurity is broken. Trust is the enemy. An entirely new approach is required — one based on Zero Trust. Championed by industry leaders including Google, Forrester, Gartner and Centrify, Zero Trust Security verifies every user, their device, and gives just enough access and privilege. Zero Trust Security continually learns & adapts to securely deliver access without boundaries.

    Join us for a live webinar to learn 5 tips on how to achieve Zero Trust Security.

    You will learn how Zero Trust will always
    •Verify the user by evaluating the authenticity of a user’s identity based on their location, device, and behaviour — beyond just a password.
    •Verify the device by only allowing access from known and trusted endpoints
    •Give just enough access by enforcing least privilege and only allowing access for a limited timeframe.
    •Learn and adapt by applying machine learning to automatically recognise out-of-the-ordinary behaviours.
    •Enable secure access without boundaries.
  • Privileged Access Security for AWS EC2 Instances - AWS Series #2
    Privileged Access Security for AWS EC2 Instances - AWS Series #2 Tony Goulding, Director of Technical Marketing Recorded: Feb 27 2018 33 mins
    Organisations are extending their data centres to a hybrid cloud environment, with Amazon Web Services (AWS) quickly becoming one of the most popular IaaS options. But, they face the challenge of maintaining the same level of privileged access security that they currently have on-premises.

    In this webinar in our Securing Hybrid Clouds webinar part of an upcoming series, you’ll see an in-depth demonstration and hear how these areas benefit from Privileged Access Security for AWS EC2 Instances.
  • PIM Best Practices: Secure Access for Remote Admins and 3rd Party Vendors
    PIM Best Practices: Secure Access for Remote Admins and 3rd Party Vendors Tony Goulding, Director of Technical Marketing, Centrify Recorded: Feb 19 2018 30 mins
    Whether they're employees, outsourced IT, vendors or managed service providers – granting remote administrators privileged access to your infrastructure introduces risk.

    Join Tony Goulding, Director of Technical Marketing at Centrify to explore 5 best practices that will improve your risk posture, while you enable remote access for your privileged users. Specifically, Tony will demonstrate how to stop the breach with the following Centrify capabilities:

    •Federated privileged access for 3rd parties
    •Targeted access to infrastructure without a VPN
    •Host-enforced privilege elevation across Windows and Linux
    •MFA everywhere you need it
    •Host-based monitoring that can’t be bypassed
  • The Impact of a Data Breach on Share Value, Churn & Reputation. Ponemon Research
    The Impact of a Data Breach on Share Value, Churn & Reputation. Ponemon Research Larry Ponemon – Chairman & Founder, Ponemon Inst.Corey Williams, Snr Director of Product Management & Marketing, Centrify Recorded: Feb 19 2018 61 mins
    The consequences of a breach ripple throughout the company causing reputation damage, customer loss, and declines in revenues. Recent data breaches cost Chipotle shareholders $400M and devalued Yahoo by $350M.

    Watch this on-demand webinar, to hear the result of a recent Ponemon research study to understand the impact of a data breach on share value, churn, and reputation.
  • Zero Trust Identity and Access Management – A Fundamental Mind Shift
    Zero Trust Identity and Access Management – A Fundamental Mind Shift Chase Cunningham, Forrester Principal Analyst, and Bill Mann, Centrify Chief Product Office Recorded: Jan 29 2018 54 mins
    The acceleration of cloud technologies coupled with the rise in the mobile workforce are key trends in driving the movement toward Zero Trust Security. Adopting a Zero Trust model for security requires a fundamental mind shift, centering on the belief that now both internal and external networks cannot be trusted, and that identities and devices must be vetted and verified in order to grant conditional policies to govern access.

    Listen to our on demand webinar to hear guest speaker Chase Cunningham, Forrester Principal Analyst, and Bill Mann, Centrify Chief Product Officer, in a lively discussion around how Zero Trust concepts can be applied to Identity and Access Management, empowering organisations to better secure and control access in an integrated and seamless fashion and ultimately limiting the risks associated with identity theft and cyberattacks.

    We’ll cover:

    -Why Identity is a core pillar of Zero Trust Security
    -Challenges in implementing a Zero Trust Security Model
    -Evolution of Zero Trust, where it is today, and where it will be tomorrow
  • Selecting the Right IDaaS for Zero Trust Security
    Selecting the Right IDaaS for Zero Trust Security Teresa Chen, Director of Product Marketing, Centrify & Andras Cser, VP & Principal Analyst, Forrester Recorded: Jan 15 2018 58 mins
    Today's sprawling workforce, mobile devices, and growing reliance on cloud infrastructure and applications play a critical role in why companies are moving away from a traditional, perimeter-based security approach. Instead it’s being replaced by a new one based on a “Zero Trust” model with identity at its core. The Zero Trust approach starts by securely identifying both the user and their device with features like single sign-on (SSO), multifactor authentication (MFA) and enterprise mobility management (EMM) — then applies context-aware policy and enforces least privilege to ensure that only the right users are accessing the right resources at the right time.


    As we look to redefine security where every access is authenticated and authorised, selecting the right IDaaS vendor becomes a critical decision to make.


    Listen to our on-demand webinar to hear guest speaker Andras Cser, Forrester Vice President and Principal Analyst, and Teresa Chen, Dir of Product Marketing, Centrify as they highlight key capabilities and differentiators that will impact your decision when selecting the right IDaaS vendor to help you achieve Zero Trust.


    Attendees will learn:


    • Key industry developments shaping the IDaaS market
    • Best practices for building a Zero Trust model centered on Identity
    • Key criteria for selecting the right IDaaS vendor
  • Stop Breaches in Real-Time Based on User Behaviour
    Stop Breaches in Real-Time Based on User Behaviour Corey Williams, Senior Director of Product Management and Marketing, Centrify Recorded: Dec 6 2017 54 mins
    In this age of access trying to build policy that keeps data secure, without impeding user productivity, requires a next-dimension security solution. Centrify Analytics Service stops these attacks, and eases access for users, based on their individual behaviour.
  • How Risk-Based MFA and SSO Stop Breaches that Target Applications
    How Risk-Based MFA and SSO Stop Breaches that Target Applications Corey Williams, Senior Director of Product Management and Marketing, Centrify Recorded: Dec 5 2017 57 mins
    Watch this on demand webinar to learn why current threats and today's hybrid environments requires to old security models.

Embed in website or blog