We interviewed Jackson Shaw; Senior Director, Product Management, Identity & Access Management at Dell and delved further into the topic of Privileged Access Management.Read more >
More than 50% of businesses today don't have a strategy to address the European General Data Protection Regulation (GDPR). For companies that fail to comply, the cost can be high - as much as 4% of annual turnover. Take control. Learn the steps to successfully implement GDPR.
Join Christian Almskou, Senior Partner ICY Security and Paul Ferron, Director Digital Identity Strategy, CA Technologies as they share perspectives on how to:
•Put breach notifications in place
•Establish repeatable controls and governance
•Prevent data breaches from happening
Join us for this informative peer session to help jump start GDPR.
Organizations are working across more cloud environments from CSPs to on premise. Just this year, enterprises are expected to utilize an average of 17 cloud applications to support IT, operations and business strategies. The cloud’s benefits are well-known, but for security teams managing multi-cloud ecosystems has its challenges, especially when it comes to access management.
Behavioral and contextual analytics are helping companies mitigate risk and better secure access to cloud applications and data. Using data-driven insights to develop internal security policies takes a more preventative identity and access management strategy.
During this webinar, we will discuss what security professionals need to assess and understand when moving towards or updating a risk-based authentication model for IAM. The presentation will outline access management policies can be identified, templated, updated and monitored to improve security around data in the cloud.
Join us for a deep dive into:
-Current implications of multi-cloud environments on IAM
-Proactively using analytics to define access policies
-Avoiding security fatigue through scenario-based authentication
-Preparing for audits using policy implementations
-A live demonstration of how this all fits together in a multi-cloud environment
The acceleration of cloud technologies coupled with the rise in the mobile workforce are key trends in driving the movement toward Zero Trust Security. Adopting a Zero Trust model for security requires a fundamental mind shift, centering on the belief that now both internal and external networks cannot be trusted, and that identities and devices must be vetted and verified in order to grant conditional policies to govern access.
Listen to our on demand webinar to hear guest speaker Chase Cunningham, Forrester Principal Analyst, and Bill Mann, Centrify Chief Product Officer, in a lively discussion around how Zero Trust concepts can be applied to Identity and Access Management, empowering organisations to better secure and control access in an integrated and seamless fashion and ultimately limiting the risks associated with identity theft and cyberattacks.
-Why Identity is a core pillar of Zero Trust Security
-Challenges in implementing a Zero Trust Security Model
-Evolution of Zero Trust, where it is today, and where it will be tomorrow
Your citizens expect better and more personalized digital services. Your employees want access to the resources and systems they need from any location. But your ability to move toward these modern digital experiences depends on how well you manage identity and access for this growing user population.
In this webinar, originally hosted by Government Technology, hear how cloud-based identity and access management lays the foundation for digital transformation with better security and less cost.
- How IAM facilitates the management of electronic identities
- Lessons learned from government IAM programs
- How IAM can help accelerate government modernization and enable jurisdictions to better meet citizen expectations
Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.
Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:
- The status of the two-factor authentication market and what we can expect in the years to come
- The enterprise risk issues of using social media credentials to access to corporate resources
- The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
- The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
Today, the need to deploy security controls for managing digital identities and associated access is pretty well understood and expressed across industries and geographic regions.
There is enough literature in the public domain emphasizing why IAM is a must and what all can go wrong if a specific product is not implemented. While product centric material is available in plenty, there is limited guidance available for information security professionals to prepare themselves and their organizations for IAM, neutral of the product.
“68% of the security leaders claim they ran successful IAM programs; the top reason attributed to the success is detailed planning and preparation.”
As part of preparation and planning for IAM program, information security professionals need to understand the concepts and approach to tackle several pertinent matters.
In this webinar we will take you through a step by step approach from a practitioner’s perspective, covering all these concerns and the related topics
Identity and Access Management can enable higher ed IT teams to boost security, increase automation, and ship new applications quickly. But it's not uncommon for legacy IAM investments to slow down technology projects across campus, and overwhelm the IT team with new operations and maintenance.
In this moderated panel discussion, Ce Cole Dillon, former CIO of Chicago State University, and Nadav Benbarak, Head of Education Solutions at Okta, discuss:
-Core higher education IAM use cases and requirements
-Challenges posed by legacy solutions
-How Identity-as-a-Service helps higher ed IT teams solve IAM once and for all
In today’s connected economy, engaging customers through digital business initiatives is a top priority. According to a recent IDG Research Survey, creating a great experience for customers depends on airtight, yet easy-to-use identity and access management technology.
In this on-demand webcast, you will learn the results of that survey and how cloud-based identity and access management enables the kind of secure engagements that delight the customer and give your business an edge.
Have you reviewed the 2018 Insider Threat Report from Cybersecurity Insiders? The results are dramatic:
• 90% of organizations feel vulnerable to insider threats
• Over 50% have experienced an insider attack in the past year
• 67% cite phishing as the prime concern of attacks
Insider Threats are real. Be ready. Join Rob Marti, Director of Privileged Access Management at CA Technologies to review the research and discuss how a layered and comprehensive privileged access management approach provides an effective countermeasure to both insider attacks and external actors.
Exploit key security tactics and strategies.
You may think that identity and access management is complex, expensive, and nearly impossible. Think again – things have changed. During this informative discussion, Jonathan Sander, identity and security specialist at Quest Software, will explore how many organizations have used the “get to one” approach to achieve their identity and access management goals while reducing costs, improving security, and achieving compliance.Read more >
In today’s digital world where mobile, web, and smart devices rule, it’s crucial to quickly integrate new business operations and build a diverse portfolio of offerings.
Because of this, banks and financial institutions are increasingly adopting technology that enable them to redefine their financial services and improve customer experience. As their business network grows, they need to be able to manage customer, partner, employee and device identities that come into play in order to remain competitive.
To help these organizations in their digital transformation journey, this session will explore the challenges of identity and access management (IAM) and the role of financial technology in digital transformation. It will also examine IAM solutions that overcome challenges and roadblocks to support digital business initiatives.
Help strengthen security through effective identity management, monitoring, and protection
Microsoft solutions can help strengthen security through effective identity management, monitoring and protection. We’ll provide an overview of the capabilities of Azure Active Directory, and Microsoft’s Identity and Access Management cloud solution (IDaaS). With capabilities including Identity Protection, SSO to thousands of SaaS apps, conditional access policies, self-service password reset, discovery and many more, Azure Active Directory is the most comprehensive IDaaS solution.
Join this webcast to learn how to:
• Enable single sign-on to any cloud and on-premises web app, even with iOS, Mac OS X, Android, and Windows Devices
• Easily extend Active directory to the cloud and continue protecting sensitive user information, data and apps
• Protect on-premises web apps with secure remote access, simultaneously reducing cost and enhancing security with self-service
This webcast is part of our Modern Workplace in Healthcare webcast series. Sign up for this session, or the entire series today!
As financial services firms warm up to the idea of being “cloud first” by deploying applications in a private or public cloud, the challenges of managing identities become increasingly complex.
With each solution generally coming to the table with its own authentication paradigm and notion of user management, it’s easy for a user to have excessive user names and passwords that often go unmanaged.
Join this session to hear about how next-generation identity solutions can drastically improve your security posture, while also enhancing end user experience through seamless access to business applications.
During this webinar, you will learn about:
• Centralized identity and access control for cloud, mobile and legacy on-prem applications
• Guaranteeing strong authentication across all services, everywhere
• Attacking surface reduction through automated provisioning and de-provisioning
• Using authentication threat insights to identify and response to compromise
In this webinar, presented by KT Secure in association with Ilex, we will be assessing the role of Identity and Access Management when establishing GDPR.Read more >
An insight into the core of what we do at Ilex International and how our Identity and Access Management solutions can enhance the security of organisations from board level down.Read more >
Today’s CA Single Sign-On (SSO) solution is not the CA SiteMinder of yesterday. Yes, SSO continues to offer seamless access management services using traditional agents, but it also offers a new range of agentless approaches. So now, you can use single sign-on and access management for applications of all shapes and sizes.
Join CA solution leaders − Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products − to learn how agentless access management can help you:
•Securely address critical user productivity needs
•Transform your approach to access management
•Foster new collaboration between security and application development teams
This session will describe the principal components of the Federal Identity Credentialing and Access Management (FICAM) Program, including the associated policy and operational infrastructure. FICAM includes the Federal Personal Identity Verification (PIV) Program and the Federal Public Key Infrastructure architecture. Implementation status within and external to the Federal Government will also be discussed.Read more >
Remember the IT of just a few short years ago? We may not have thought so then, but what a much simpler time it was…applications under enterprise control, unified access and a limited number of systems to manage corporate identities. How much has changed! Today, cloud and mobile have stretched IT to reach new people in new ways – from third party suppliers and partners to the pocket of the retail customer. But this new reach also puts the enterprise at greater risk of losing control over access to sensitive information resources.
It doesn’t have to be that way. In this webinar, Scott Crawford, research director of information security at 451 Research, and Brandon Whichard with IBM will illustrate how today’s risks go beyond simply stretching demands on user identities and access – and how, with visibility and control across a wide spectrum of IT, enterprises can take back control, if they know where and how to act.
Identity and Access Management (IAM) are critical enterprise services which require policy and technical execution. Employee performance and enterprise governance, risk management and compliance depend on this. Threats exists to IAM services throughout their lifecycle from registration through transaction authentication. Surprisingly many organizations continue to employ identity, credentialing and access control solutions which are broken.
This webcast will look at:
· Requirements for personal and device identity registration
· Strong authentication compromises
· Secret compromises
· Infrastructure compromises
· Best practice for robust identity and access management and strong authentication
· Evolving standards
In today's open and interconnected enterprise, traditional perimeters are being extended to adopt mobile, cloud, social access and information interactions. To make matters worse, many organizations face the growing risk and burden of managing multiple identity and access controls without the required security intelligence to address those challenges. They need the ability to secure identity and access across the wide variety of enterprise and internet resources from any device, any service and any source. In this session, join IBM to review the emerging needs, the next generation access and identity management solutions available today to enable secure and rapid adoption of mobile, cloud, and social transformation.Read more >
Conventional security architecture took advantage of ingress and egress points on a fairly well defined set of enterprise perimeters. Various cloud patterns (IaaS, PaaS, and SaaS) have disrupted the perimeter and in some cases (such as native mobile to SaaS) totally bypassed it. This whitepaper presents a new concept for Threat Centric IAM to address the need to enhance security measures with a threat intelligence approach.Read more >