How do I best ensure sensitive data is protected, stored, and backed up securely?
As the impact of GDPR continues to ripple throughout IT, organizations need to understand how their identity and access management ecosystem will be impacted and how identities will need to be managed going forward.
In this webinar, we cover how GDPR regulations such as data capture, consent, right to be forgotten and more will change identity lifecycle management internally and externally forever.
Enabling you to find known and unknown threats in real-time through powerful correlation and context, integrated with the leading user behaviour analytics solution. Close security gaps and prevent high value data loss by protecting personal data at data field level and automatically identifying application vulnerabilities for strong applications development operations.
Organizations are working across more cloud environments from CSPs to on premise. Just this year, enterprises are expected to utilize an average of 17 cloud applications to support IT, operations and business strategies. The cloud’s benefits are well-known, but for security teams managing multi-cloud ecosystems has its challenges, especially when it comes to access management.
Behavioral and contextual analytics are helping companies mitigate risk and better secure access to cloud applications and data. Using data-driven insights to develop internal security policies takes a more preventative identity and access management strategy.
During this webinar, we will discuss what security professionals need to assess and understand when moving towards or updating a risk-based authentication model for IAM. The presentation will outline access management policies can be identified, templated, updated and monitored to improve security around data in the cloud.
Join us for a deep dive into:
-Current implications of multi-cloud environments on IAM
-Proactively using analytics to define access policies
-Avoiding security fatigue through scenario-based authentication
-Preparing for audits using policy implementations
-A live demonstration of how this all fits together in a multi-cloud environment
More than 50% of businesses today don't have a strategy to address the European General Data Protection Regulation (GDPR). For companies that fail to comply, the cost can be high - as much as 4% of annual turnover. Take control. Learn the steps to successfully implement GDPR.
Join Christian Almskou, Senior Partner ICY Security and Paul Ferron, Director Digital Identity Strategy, CA Technologies as they share perspectives on how to:
•Put breach notifications in place
•Establish repeatable controls and governance
•Prevent data breaches from happening
Join us for this informative peer session to help jump start GDPR.
The acceleration of cloud technologies coupled with the rise in the mobile workforce are key trends in driving the movement toward Zero Trust Security. Adopting a Zero Trust model for security requires a fundamental mind shift, centering on the belief that now both internal and external networks cannot be trusted, and that identities and devices must be vetted and verified in order to grant conditional policies to govern access.
Listen to our on demand webinar to hear guest speaker Chase Cunningham, Forrester Principal Analyst, and Bill Mann, Centrify Chief Product Officer, in a lively discussion around how Zero Trust concepts can be applied to Identity and Access Management, empowering organisations to better secure and control access in an integrated and seamless fashion and ultimately limiting the risks associated with identity theft and cyberattacks.
-Why Identity is a core pillar of Zero Trust Security
-Challenges in implementing a Zero Trust Security Model
-Evolution of Zero Trust, where it is today, and where it will be tomorrow
Are you using or plan on using managed security services for privileged access or identity management? The market for managed security service is undergoing tremendous growth – it’s set to double within the next two years.
Join us to learn how one MSP uses Privileged Access Management and Identity Management to streamline internal security controls and help customers reduce risk. We'll discuss use cases that managed security companies are addressing and provide insight on how best of breed companies are adapting.
Your citizens expect better and more personalized digital services. Your employees want access to the resources and systems they need from any location. But your ability to move toward these modern digital experiences depends on how well you manage identity and access for this growing user population.
In this webinar, originally hosted by Government Technology, hear how cloud-based identity and access management lays the foundation for digital transformation with better security and less cost.
- How IAM facilitates the management of electronic identities
- Lessons learned from government IAM programs
- How IAM can help accelerate government modernization and enable jurisdictions to better meet citizen expectations
Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.
Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:
- The status of the two-factor authentication market and what we can expect in the years to come
- The enterprise risk issues of using social media credentials to access to corporate resources
- The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
- The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
As organizations move to the cloud and adopt productivity suites like Microsoft Office 365, they’re presented with new risks around user access and authentication, data security, and cloud threats.
In this webinar, attendees will learn:
- How Okta and Netskope provide additional security controls for your cloud deployments.
- Hear about top use cases around identity management and cloud security.
Today, the need to deploy security controls for managing digital identities and associated access is pretty well understood and expressed across industries and geographic regions.
There is enough literature in the public domain emphasizing why IAM is a must and what all can go wrong if a specific product is not implemented. While product centric material is available in plenty, there is limited guidance available for information security professionals to prepare themselves and their organizations for IAM, neutral of the product.
“68% of the security leaders claim they ran successful IAM programs; the top reason attributed to the success is detailed planning and preparation.”
As part of preparation and planning for IAM program, information security professionals need to understand the concepts and approach to tackle several pertinent matters.
In this webinar we will take you through a step by step approach from a practitioner’s perspective, covering all these concerns and the related topics
Did you know that nearly half of the calls to company help desks are for resetting employee passwords? It's a staggering amount of time, money, and productivity wasted on a single task. How would you like a solution that eliminates passwords for identity management access and uses biometrics instead?
In this webinar, we discuss:
Eliminating passwords entirely, replacing them with biometrics
Adding biometrics for two-factor authentication
Securing login to Active Directory and Citrix environments
Integrating behavioral biometrics for passive authentication
Identity and Access Management can enable higher ed IT teams to boost security, increase automation, and ship new applications quickly. But it's not uncommon for legacy IAM investments to slow down technology projects across campus, and overwhelm the IT team with new operations and maintenance.
In this moderated panel discussion, Ce Cole Dillon, former CIO of Chicago State University, and Nadav Benbarak, Head of Education Solutions at Okta, discuss:
-Core higher education IAM use cases and requirements
-Challenges posed by legacy solutions
-How Identity-as-a-Service helps higher ed IT teams solve IAM once and for all
In today’s connected economy, engaging customers through digital business initiatives is a top priority. According to a recent IDG Research Survey, creating a great experience for customers depends on airtight, yet easy-to-use identity and access management technology.
In this on-demand webcast, you will learn the results of that survey and how cloud-based identity and access management enables the kind of secure engagements that delight the customer and give your business an edge.
You may think that identity and access management is complex, expensive, and nearly impossible. Think again – things have changed. During this informative discussion, Jonathan Sander, identity and security specialist at Quest Software, will explore how many organizations have used the “get to one” approach to achieve their identity and access management goals while reducing costs, improving security, and achieving compliance.Read more >
In today’s digital world where mobile, web, and smart devices rule, it’s crucial to quickly integrate new business operations and build a diverse portfolio of offerings.
Because of this, banks and financial institutions are increasingly adopting technology that enable them to redefine their financial services and improve customer experience. As their business network grows, they need to be able to manage customer, partner, employee and device identities that come into play in order to remain competitive.
To help these organizations in their digital transformation journey, this session will explore the challenges of identity and access management (IAM) and the role of financial technology in digital transformation. It will also examine IAM solutions that overcome challenges and roadblocks to support digital business initiatives.
Help strengthen security through effective identity management, monitoring, and protection
Microsoft solutions can help strengthen security through effective identity management, monitoring and protection. We’ll provide an overview of the capabilities of Azure Active Directory, and Microsoft’s Identity and Access Management cloud solution (IDaaS). With capabilities including Identity Protection, SSO to thousands of SaaS apps, conditional access policies, self-service password reset, discovery and many more, Azure Active Directory is the most comprehensive IDaaS solution.
Join this webcast to learn how to:
• Enable single sign-on to any cloud and on-premises web app, even with iOS, Mac OS X, Android, and Windows Devices
• Easily extend Active directory to the cloud and continue protecting sensitive user information, data and apps
• Protect on-premises web apps with secure remote access, simultaneously reducing cost and enhancing security with self-service
This webcast is part of our Modern Workplace in Healthcare webcast series. Sign up for this session, or the entire series today!
For many companies, Amazon Web Services is the foundation of their software apps, containing valuable software code that is critical to protect. Join us to learn about mistakes to avoid when using AWS Identity and Access Management (IAM) - and how to address them.
AWS solution architect will touch on Federated Users, Trust & Access Policies and AWS Organizations, and you’ll see a demo of how to set up a secure OneLogin+AWS deployment.
In this webinar you will learn:
- IAM misconfigurations made by AWS customers
- Best practices for AWS access security
- How to extend AWS IAM security using SAML integration, Multi-Factor Authentication, and AWS Roles
- How to get your own Free OneLogin for AWS Account
D-Day is right around the corner. By now, most companies are nearly completed with putting the necessary steps in place to meet the requirements. However, it is suspected that many companies will end up spending significantly more money per year meeting these regulations. Also, it is most likely that most of these changes have added more complexity to their business operations.
Yet, it doesn’t have to be this way. This webinar will highlight the 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted. It will then breakdown methods to optimize the processes and technology used to address these requirements in a way that will significantly lower the effort and cost of your company’s operations.
Join us to discuss:
- How to assess the level of exposure your company has to this regulation
- Recognizing the 10 key new data management requirements that have been put in place
- Identifying processes and tools that will significantly reduce the effort required to meet regulations
As financial services firms warm up to the idea of being “cloud first” by deploying applications in a private or public cloud, the challenges of managing identities become increasingly complex.
With each solution generally coming to the table with its own authentication paradigm and notion of user management, it’s easy for a user to have excessive user names and passwords that often go unmanaged.
Join this session to hear about how next-generation identity solutions can drastically improve your security posture, while also enhancing end user experience through seamless access to business applications.
During this webinar, you will learn about:
• Centralized identity and access control for cloud, mobile and legacy on-prem applications
• Guaranteeing strong authentication across all services, everywhere
• Attacking surface reduction through automated provisioning and de-provisioning
• Using authentication threat insights to identify and response to compromise
Today’s digital transformation initiatives have substantial consequences for a company’s overall security posture, potentially impacting both security architectures and attack surface. Traditional security perimeters are no longer compatible with today’s business models as both corporate assets and users are increasingly outside the perimeter, while targeted, advanced threats are shifting inside. Adopting a Zero Trust Security model centers on the belief that untrusted actors already exist both inside and outside the network, and that identities and endpoints must be verified and validated in order to grant conditional policies to govern access.
Join Bill Mann, Centrify’s Chief Product Officer, and Garrett Bekker, Principal Analyst at 451 Research, in a lively discussion around how Zero Trust concepts can be applied to Identity and Access Management, empowering organizations to better secure and control access in an integrated and seamless fashion and ultimately limiting the risks associated with identity theft and cyberattacks.
Attendees will also takeaway:
•Top challenges and perspectives in implementing Zero Trust Security
•The latest statistics on how breaches happen and why Zero Trust Security is important
•Practical takeaways around how to start your Zero Trust Security journey with Next-Gen Access
In this webinar, presented by KT Secure in association with Ilex, we will be assessing the role of Identity and Access Management when establishing GDPR.Read more >
Today’s CA Single Sign-On (SSO) solution is not the CA SiteMinder of yesterday. Yes, SSO continues to offer seamless access management services using traditional agents, but it also offers a new range of agentless approaches. So now, you can use single sign-on and access management for applications of all shapes and sizes.
Join CA solution leaders − Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products − to learn how agentless access management can help you:
•Securely address critical user productivity needs
•Transform your approach to access management
•Foster new collaboration between security and application development teams
An insight into the core of what we do at Ilex International and how our Identity and Access Management solutions can enhance the security of organisations from board level down.Read more >