Today’s CA Single Sign-On (SSO) solution is not the CA SiteMinder of yesterday. Yes, SSO continues to offer seamless access management services using traditional agents, but it also offers a new range of agentless approaches. So now, you can use single sign-on and access management for applications of all shapes and sizes.
Join CA solution leaders − Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products − to learn how agentless access management can help you:
•Securely address critical user productivity needs
•Transform your approach to access management
•Foster new collaboration between security and application development teams
Organizations are working across more cloud environments from CSPs to on premise. Just this year, enterprises are expected to utilize an average of 17 cloud applications to support IT, operations and business strategies. The cloud’s benefits are well-known, but for security teams managing multi-cloud ecosystems has its challenges, especially when it comes to access management.
Behavioral and contextual analytics are helping companies mitigate risk and better secure access to cloud applications and data. Using data-driven insights to develop internal security policies takes a more preventative identity and access management strategy.
During this webinar, we will discuss what security professionals need to assess and understand when moving towards or updating a risk-based authentication model for IAM. The presentation will outline access management policies can be identified, templated, updated and monitored to improve security around data in the cloud.
Join us for a deep dive into:
-Current implications of multi-cloud environments on IAM
-Proactively using analytics to define access policies
-Avoiding security fatigue through scenario-based authentication
-Preparing for audits using policy implementations
-A live demonstration of how this all fits together in a multi-cloud environment
Do you continuously verify users’ identities and enforce access management policies each time a user logs into a cloud application? Watch and learn how identity and access management works in the cloud, then explore how to improve security and management, visit https://safenet.gemalto.com/access-managementRead more >
The acceleration of cloud technologies coupled with the rise in the mobile workforce are key trends in driving the movement toward Zero Trust Security. Adopting a Zero Trust model for security requires a fundamental mind shift, centering on the belief that now both internal and external networks cannot be trusted, and that identities and devices must be vetted and verified in order to grant conditional policies to govern access.
Listen to our on demand webinar to hear guest speaker Chase Cunningham, Forrester Principal Analyst, and Bill Mann, Centrify Chief Product Officer, in a lively discussion around how Zero Trust concepts can be applied to Identity and Access Management, empowering organisations to better secure and control access in an integrated and seamless fashion and ultimately limiting the risks associated with identity theft and cyberattacks.
-Why Identity is a core pillar of Zero Trust Security
-Challenges in implementing a Zero Trust Security Model
-Evolution of Zero Trust, where it is today, and where it will be tomorrow
Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.
Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
D-Day is right around the corner. By now, most companies are nearly completed with putting the necessary steps in place to meet the requirements. However, it is suspected that many companies will end up spending significantly more money per year meeting these regulations. Also, it is most likely that most of these changes have added more complexity to their business operations.
Yet, it doesn’t have to be this way. This webinar will highlight the 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted. It will then breakdown methods to optimize the processes and technology used to address these requirements in a way that will significantly lower the effort and cost of your company’s operations.
Join us to discuss:
- How to assess the level of exposure your company has to this regulation
- Recognizing the 10 key new data management requirements that have been put in place
- Identifying processes and tools that will significantly reduce the effort required to meet regulations
Today’s organizations are utilizing the benefits of access management to balance ease of access to a variety of cloud and on-premises applications from anywhere, on any device. While this enables users with 24/7 access, it also creates a large attack surface that is prime to be compromised. With 77% of data breaches involving an insider, it has become necessary to ensure access to all corporate resources is secured and governed.
By leveraging the power of identity governance with access management, you can now institute an identity-aware solution that securely and effectively authenticates, provisions and governs access to all applications and data across the enterprise ensuring adherence to corporate policies and security requirements.
Are you using or plan on using managed security services for privileged access or identity management? The market for managed security service is undergoing tremendous growth – it’s set to double within the next two years.
Join us to learn how one MSP uses Privileged Access Management and Identity Management to streamline internal security controls and help customers reduce risk. We'll discuss use cases that managed security companies are addressing and provide insight on how best of breed companies are adapting.
Lack of control over privileged access to systems and data presents a significant risk to almost every organization. What is required to protect privileged accounts? Are you in control? Do you have an effective Privileged Access Management (PAM) program? This session discussed how to assess the current state of your PAM program, develop a road map to meet your desired target state, and select the right PAM solution to help you gain better control over privileged access.Read more >
Have you reviewed the 2018 Insider Threat Report from Cybersecurity Insiders? The results are dramatic:
• 90% of organizations feel vulnerable to insider threats
• Over 50% have experienced an insider attack in the past year
• 67% cite phishing as the prime concern of attacks
Insider Threats are real. Be ready. Join CA hosts - Rob Marti, Privileged Access Management Director and Alexandra Beswerchij, Product Marketing Manager - to review the research and discuss how a layered and comprehensive Enterprise IAM approach enhances PAM to provides an effective countermeasure to both insider attacks and external actors.
Exploit key security tactics and strategies.
How do I best ensure sensitive data is protected, stored, and backed up securely?
As the impact of GDPR continues to ripple throughout IT, organizations need to understand how their identity and access management ecosystem will be impacted and how identities will need to be managed going forward.
In this webinar, we cover how GDPR regulations such as data capture, consent, right to be forgotten and more will change identity lifecycle management internally and externally forever.
Enabling you to find known and unknown threats in real-time through powerful correlation and context, integrated with the leading user behaviour analytics solution. Close security gaps and prevent high value data loss by protecting personal data at data field level and automatically identifying application vulnerabilities for strong applications development operations.
May 25, 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.
Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.
Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
Access to and within DevOps environments have proliferated over the past few years, with both users and scripts (with embedded credentials). This privileged identity sprawl poses significant risks that need to be addressed.Join CA Technologies and (ISC)2 on December 7, 2017 at 1:00PM Eastern. In this session, we'll look at the technology and approach that CA takes to secure such environments.Read more >
The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.
Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
Your citizens expect better and more personalized digital services. Your employees want access to the resources and systems they need from any location. But your ability to move toward these modern digital experiences depends on how well you manage identity and access for this growing user population.
In this webinar, originally hosted by Government Technology, hear how cloud-based identity and access management lays the foundation for digital transformation with better security and less cost.
- How IAM facilitates the management of electronic identities
- Lessons learned from government IAM programs
- How IAM can help accelerate government modernization and enable jurisdictions to better meet citizen expectations
Did you know that nearly half of the calls to company help desks are for resetting employee passwords? It's a staggering amount of time, money, and productivity wasted on a single task. How would you like a solution that eliminates passwords for identity management access and uses biometrics instead?
In this webinar, we discuss:
Eliminating passwords entirely, replacing them with biometrics
Adding biometrics for two-factor authentication
Securing login to Active Directory and Citrix environments
Integrating behavioral biometrics for passive authentication
Following an incident, the simple question “Who did what?” is one of the most critical, yet most difficult, questions to answer.
From this 52-minutes on-demand webinar session, you will learn incident investigation best practices. We present a real-life incident investigation scenario and show how advanced privileged access management tools can help you in the forensics process related to privileged account misuse.
For many companies, Amazon Web Services is the foundation of their software apps, containing valuable software code that is critical to protect. Join us to learn about mistakes to avoid when using AWS Identity and Access Management (IAM) - and how to address them.
AWS solution architect will touch on Federated Users, Trust & Access Policies and AWS Organizations, and you’ll see a demo of how to set up a secure OneLogin+AWS deployment.
In this webinar you will learn:
- IAM misconfigurations made by AWS customers
- Best practices for AWS access security
- How to extend AWS IAM security using SAML integration, Multi-Factor Authentication, and AWS Roles
- How to get your own Free OneLogin for AWS Account
Exciting enhancements to PCoIP Management Console are now available in Release 3.1. Learn more about the new capabilities and participate in our live Q&A with Teradici experts Paul Barrett, Systems Specialist, Global Support Services and Arjen van der Meulen, Director of Product Management. This brief webinar will cover everything you need to do about this important release through a live demonstration, including:
-The new licensing web interface
-How to discover and manage PCoIP Remote Workstation Cards
-How to peer a zero client with a PCoIP Remote Workstation Card
Today, the vast majority of organizations struggle to manage complex application environments consisting of a growing portfolio of SaaS applications as well as commercial off-the-shelf and custom web apps hosted on-premises, at remote data centers, and in private clouds. Organizations are further challenged to manage access to applications, networks, and devices for users stored in disparate directories.
The Future of Access Management is here. Join 451 Research’s Sr. Analyst Garrett Bekker, OneLogin’s CMO Miles Kelly and Director of Product Gary Gwin as they unveil a new way to unify access to both SaaS and on-premises applications, as well as access to networks and devices, all with a single Identity-as-a-Service (IDaaS) solution.