Hi [[ session.user.profile.firstName ]]

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World

Adoption of cloud-based applications is growing steadily, yet most traditional security approaches are no longer applicable when moving to the cloud. Identity management and access controls are one of the most effective ways to manage the risks associated with the cloud, but most organizations still need to control access to legacy applications as well. Join 451 Research and OneLogin as we explore the current state of identity management and discuss some of the emerging access control technologies that can help address these challenges.

Register for this informative webinar and learn:

– What are the most common downfalls of traditional IAM and what makes cloud-based IAM a viable alternative?
– What should companies consider when choosing a cloud-based IAM solution?
– How to add access controls for cloud applications without leaving legacy applications behind
– Key benefits from deploying IDaaS in hybrid environments
– Quick Demo of OneLogin to secure the hybrid enterprise
– Q&A
Recorded May 17 2016 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Garrett Bekker, Senior Analyst, Information Security at 451 Research; David Meyer, VP Product at OneLogin
Presentation preview: Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Harden Your MFA with Machine Learning Recorded: Apr 19 2018 57 mins
    Merritt Maxim, Senior Forrester Analyst, Forrester Research, Al Sargent, Sr. Product Marketing Director, OneLogin
    For security teams who need to reduce the risk of account takeovers, static multi-factor authentication (MFA) is a thing of the past for catching new security risks. Legacy MFA providers that use static rules miss high-risk login and miss security risks. Machine intelligence is now required to determine whether to prompt users for MFA using a broad set of inputs, including networks, geography, devices and time.

    Learn how to detect a broader set of attacks and strengthen your company’s security posture.

    In this learning session, OneLogin’s Al Sargent joins Forrester Senior Analyst, Merritt Maxim to dissect the current state of MFA and highlight the role of machine learning to advance the state of corporate security.
  • How to Reduce Data Breaches with Cloud-authenticated Laptops Recorded: Apr 5 2018 61 mins
    Maxim Merritt, Senior Forrester Analyst, Forrester Research, Al Sargent, Sr. Product Marketing Director, OneLogin
    Your company may be overlooking a big security gap. Despite the rapid adoption of SaaS or web applications by enterprises, many of them still rely on on-premises Active Directory (AD) to manage password policies and authenticate laptops.

    This approach worked in 2000 when every employee used a PC behind a firewall. Fast forward 17 years later, corporate laptops are used remotely and Macs and a flexible workforce of contractors are becoming common. Many of these laptops are excluded from corporate security policies password requirements. Once stolen or compromised, this leaves companies with widespread security gaps waiting to be exploited.

    Join OneLogin’s Al Sargent and guest speaker Forrester’s Senior Analyst, Merritt Maxim, as we discuss:

    - Today’s widespread security gaps and their economic impacts
    - A new approach to Identity and Access Management to manage security issue
    - Hardening enterprise’s endpoints while moving to the cloud, without disrupting existing identity architectures
  • Hybrid Access Management for both On-Prem and Cloud Apps Recorded: Mar 29 2018 61 mins
    Anil Goel, IAM Architect, Wipro, Gary Gwin, Director of Product, OneLogin
    If you work with legacy Web Access Management (WAM) products, you know what a pain they are. Policy server sprawl. Ancient code. Nightmarish support. Difficult upgrades. It doesn’t have to be like this.

    Watch this webinar to learn how they helped an established, 100-year-old enterprise implement an identity solution that integrates a wide range of on-premises and SaaS applications — fast, seamlessly, and securely.

    In this session, Wipro’s Anil Goel (IAM Architect) and Geetha Hari (Global IAM Solutions Lead) join forces with OneLogin’s Gary Gwin (Director of Product) to show how you can plan and execute your escape legacy WAM hell.
  • Myths & Realities of Multi-factor Authentication: The CISO Perspective Recorded: Mar 22 2018 33 mins
    Stephen Lawton, Special Projects Editor, SC Magazine, Alvaro Hoyos, CISO, OneLogin
    Passwords alone won’t cut it in the days of sophisticated phishing, spoofed email and social engineering attacks. High-profile security breaches are making headlines weekly, and the number of incidents continues to rise. Multi-factor authentication (MFA) has become the go-to tactic to prevent malicious parties from accessing sensitive corporate data. While MFA provides undeniable value, conventional MFA solutions are difficult and time-consuming to implement with end-user usability implications.

    Watch this informative on-demand webcast hosted by SC Magazine featuring OneLogin’s, CISO, Alvaro Hoyo as we uncover the current state of MFA and the tangible security value it provides, plus key elements of a successful MFA strategy.
  • The Emergence of Unified Access Management Recorded: Mar 19 2018 40 mins
    Garrett Bekker of 451 Research, Miles Kelly of OneLogin and Gary Gwin of OneLogin
    Today, the vast majority of organizations struggle to manage complex application environments consisting of a growing portfolio of SaaS applications as well as commercial off-the-shelf and custom web apps hosted on-premises, at remote data centers, and in private clouds. Organizations are further challenged to manage access to applications, networks, and devices for users stored in disparate directories.

    The Future of Access Management is here. Join 451 Research’s Sr. Analyst Garrett Bekker, OneLogin’s CMO Miles Kelly and Director of Product Gary Gwin as they unveil a new way to unify access to both SaaS and on-premises applications, as well as access to networks and devices, all with a single Identity-as-a-Service (IDaaS) solution.
  • How To Prepare for Intensifying Cyber Security Risks in 2017 Recorded: Dec 15 2016 58 mins
    Andras Cser VP and Principal Analyst, Forester, Al Sargent Sr. Director Product Marketing, OneLogin
    Applications are under siege, and successful application attacks are the source of the biggest data loss. While there isn't an "easy" button for cyber security, there are some proven initiatives security professionals can take to ensure employees can seamlessly access the right applications - while keeping corporate data secure.

    Join guest speaker, Andras Cser from Forrester and OneLogin as we discuss key predictions for 2017, and outline how you can automate secure access to your applications, laptops, and mobile devices in a rapidly evolving landscape. Don't miss the experience, without compromising security.
  • Stop Hackers with Integrated CASB & IDaaS Security Recorded: Dec 7 2016 54 mins
    CloudLock: Brad Pielech - Integrations Architect, CloudLock OneLogin: Mario Tarabbia - Director of Sales Engineering
    Your organization has turned to cloud platforms and applications (including SaaS, IaaS, PaaS, and even IDaaS) to meet business needs, and it’s your job to make sure those applications are both easily accessible as well as airtight. Luckily, a new set of identity and security solutions have arrived that ensure fast access and security around all your publicly accessible data,w the apps it resides on, and the users engaged.

    Find out how OneLogin’s identity and access management capabilities including single sign on (SSO), combined with CloudLock’s cloud cybersecurity solution can make users more secure and productive in the cloud, no matter the data, applications, or people they work with.

    Join OneLogin and CloudLock to learn how to:

    – Identify the top five cyber threats to your cloud environment
    – Protect against cloud security risks leveraging advanced user behavior analysis
    – Improve company-wide productivity through streamlined identity and access management
    – Easily automate your cloud access management process
    – Put it all into action quickly – managing cloud application security with a powerful IDaaS+CASB joint solution
  • Securing Access to On-Prem and SAAS Environments with Cloud-Based IAM Recorded: Nov 16 2016 50 mins
    Merritt Maxim, Senior Analyst at Forrester Research
    Despite the rapid enterprise adoption of SaaS, many organizations still rely on a hybrid mix of on-premise and SaaS apps to run their business, creating administrative challenges and inefficiencies.

    Identity-as-a-service (IDaaS) solutions have evolved to provide business and security professionals with a viable and compelling alternative to traditional IAM options. Besides delivering all the great cloud benefits, cloud-based IAM offerings can integrate with on-premise environments to increase business agility, reduce operational inefficiencies, mitigate identity risks, and improve real-time visibility for today's hybrid enterprise.

    Join featured speaker Merritt Maxim, Senior Analyst at Forrester Research, as he discusses the state of IDaaS in the context of new architectures and real world use-cases, including:

    – Current IDaaS Market Trends
    – Critical considerations for building an IDaaS architecture & strategy
    – Challenges in extending on-premises
    – IAM approaches to the cloud
    – Key benefits from deploying IDaaS in hybrid environment
    – Quick Demo of OneLogin IDaaS solution for hybrid environment
  • Secure Your Company in 2017: Four Key Initiatives Recorded: Nov 8 2016 63 mins
    Garrett Bekker Senior Analyst, Information Security at 451 Research, Al Sargent Sr. Director Product Marketing at OneLogin
    Risk flows to the least-secure. Hackers will target what they see as the weakest link. Given the unrelenting security attacked we've seen in 2016 - and their high costs - you don't want your company to be seen as a target in 2017.

    Join 451 Research and OneLogin as we explore the current state of identity security and share best practice findings on what security initiatives you should pursue in 2017, including:

    HR-driven IDaaS for high-integrity on- and off-boarding
    Automated threat response with CASB/IDaaS integration
    Application threat aware integration with IDaaS/SIEM integration
    Unified Endpoint Management to extend cloud security to all devices
  • Prevent Laptop Security Breaches, No Active Directory Required Recorded: Sep 22 2016 63 mins
    Al Sargent Sr. Dir. Product Marketing, OneLogin and Tal Herman Lead Product Manager, Identity, OneLogin
    It only takes one unsecured laptop for a security breach to occur. OneLogin Desktop can fix that. Cloud-first companies can use it to secure laptops by connecting them to our cloud directory. Companies with Active Directory can use it to secure laptops that aren’t domain-joined -- Macs, or PCs used by non-employees.

    Join our live webinar to find out how OneLogin Desktop can help you:

    Extend strong authentication policies to all your laptops, including operating system password complexity, rotation, and uniqueness
    Implement frictionless multi-factor authentication that secures all SaaS application access without impacting employee productivity
    Reduce service desk loads by presenting end users with a simplified sign-in experience that reduces password-reset requests.
  • Secure Your Company from the SaaS Tsunami Recorded: Sep 8 2016 64 mins
    Al Sargent, Sr. Dir. Product Marketing, OneLogin, Michael Gleason, Product Marketing Manager, Cloudlock
    According to Gartner, a staggering 600 to 1000 SaaS apps are in use at a typical company, yet IT only knows about & manages ~7%. The unmanaged ~93% pose very real security and compliance challenges including unauthorized access, data leakage, and violation of industry regulations.

    Gartner calls this the "SaaS Tsunami". It grows daily as employees sign up for new SaaS apps using corporate credentials -- all it takes is a browser, a credit card, and an expense report - two clicks and they’re in. Join us for an interactive webinar on how to bring unmanaged SaaS apps out of the shadows to reduce security and compliance risks.

    By joining this webinar, you will:

    - Quantify the scope of the SaaS Tsunami and its security impact on your business
    - Learn how to discover and manage previously unknown apps
    - Be quick on your feet and take action when risk is introduced
    - See a demo on how you can mitigate the security threats posed by the SaaS Tsunami
  • Simplify Your Google Apps Collaboration and Management with IDaaS Recorded: Aug 18 2016 44 mins
    Nathan Chan, Solutions Architect at OneLogin
    Google Apps for Work is a preferred solution for productivity and collaboration in the modern enterprise. But with a large suite of tools, proper provisioning and maintenance is anything but easy. Attempting to roll out Google Apps to the right users with the right access often results in over-extended IT resources, delayed employee on- and off-boarding, and misallocated access to key documents and data.

    It doesn’t have to be this way. Hundreds of organizations are using OneLogin’s best-in-class directory integrations to achieve faster Google Apps time-to-value and on-going application security and automation.

    Join OneLogin for an informative webinar designed to get you through the most complex of Google Apps deployments.
  • Fast Track Your Office 365 Deployment and Beyond Recorded: Aug 9 2016 36 mins
    OneLogin Solutions Engineer Nathan and Chan Mustafa Ebadi, VP of IT & Services at SOTI
    Whether you’ve just purchased Office 365 or have been using it for a while, deploying and managing safe access to Office 365 is not simple, fast, or pleasant. It’s your job to get the most value from your application investments, and while Microsoft has tools to assist like ADFS and DirSync, they are not only cumbersome and costly to maintain, but do not meet industry standards that can be scaled across your organization. And let’s face it, you’re not just implementing Microsoft products. Can you extend ADFS beyond Office 365 in a timely matter?

    Join OneLogin and customer SOTI, a proven product innovator and EMM Industry leader in mobile consulting, for an informative webinar about deployment best practices for Office 365 integrated with Active Directory.
  • IDaaS: Modernize Your IAM in the Cloud Recorded: Aug 2 2016 44 mins
    Nathan Chan, Solutions Architect at OneLogin and Al Sargent, Senior Director of Product Marketing at OneLogin
    IT, Security, and IT infrastructure teams are faced with a complex set of challenges, and identity and access management (IAM) done the old way tends to compound things. Companies who haven’t modernized their IAM infrastructure can spend months dedicated to setting up each new business application, both on premises and in the cloud, and another several months launching it to their users. It doesn’t have to be this way, with cloud-based solutions such as OneLogin reducing the time, effort, and risk of IAM modernization.

    Join us for an informative webinar with OneLogin presenters Nathan Chan, Solutions Architect, and Al Sargent, Sr. Director of Product Marketing.
  • Supporting Legacy Infrastructure on the Way to the Cloud Recorded: Jun 16 2016 47 mins
    Andras Cser, Principal Analyst at Forrester; David Meyer, VP Product at OneLogin
    Join featured speaker Forrester Principal Analyst Andras Cser and OneLogin VP Product David Meyer as they discuss how to protect legacy investments, while securely expanding cloud application portfolios and extending identity management to devices.

    The following topics will be covered:

    – Benefits of a unified cloud directory
    – Support for IT protocols including LDAP, RADIUS, and more
    – Support for directory consolidation
    – Secure access to WiFi, VPN, SSH, on-prem and cloud applications
    – Extending identity management to the device
    – Cloud-based replacement for on-premises Active Directory and LDAP directories
    – Demonstration of key IDaaS features
    – Q&A
  • Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World Recorded: May 17 2016 56 mins
    Garrett Bekker, Senior Analyst, Information Security at 451 Research; David Meyer, VP Product at OneLogin
    Adoption of cloud-based applications is growing steadily, yet most traditional security approaches are no longer applicable when moving to the cloud. Identity management and access controls are one of the most effective ways to manage the risks associated with the cloud, but most organizations still need to control access to legacy applications as well. Join 451 Research and OneLogin as we explore the current state of identity management and discuss some of the emerging access control technologies that can help address these challenges.

    Register for this informative webinar and learn:

    – What are the most common downfalls of traditional IAM and what makes cloud-based IAM a viable alternative?
    – What should companies consider when choosing a cloud-based IAM solution?
    – How to add access controls for cloud applications without leaving legacy applications behind
    – Key benefits from deploying IDaaS in hybrid environments
    – Quick Demo of OneLogin to secure the hybrid enterprise
    – Q&A
  • Modern Identity Part 3 | Optimizing User Experience in Cloud Initiatives Recorded: Nov 4 2015 22 mins
    Chip Epps, Sr. Director, Product Marketing
    The marketplace is getting increasingly competitive and employees work hard to meet company objectives and advance their own skills and careers. Manually signing into applications, changing expired passwords, locating apps and resetting passwords detract from the productive time that could be spent meeting their goals.

    OneLogin increases productivity by automatic processes to sign users into applications, and eliminating or automating password resets. This webinar will introduce the latest practices to give users instant and secure access to their cloud and on-premises applications, including exciting new approaches for Mac SSO.
  • Modern Identity Part 2 | Minimizing Complexities in IT Operations Recorded: Oct 28 2015 40 mins
    Chip Epps, Sr. Director, Product Marketing
    Deploying Identity & Access Management corporate-wide to support a growing number of sanctioned cloud applications can be a costly and time-consuming project, particularly when traditional on-premise solutions like Active Directory Federation Services can be complex to implement. And with organizations integrating more long tail of applications with fewer users, it becomes hard to see the return-on-investment and as result the deployment only covers a subset of the applications.
  • Modern Identity Part 1 | Mitigating Operations and Information Risk Recorded: Oct 21 2015 48 mins
    Rob Capozzi | Sr. Sales Engineer • Chip Epps | Sr. Director, Product Marketing
    Data stored in the cloud is not protected by corporate firewalls and IT has little or no visibility into who attempts to sign into cloud applications. Former employees and contractors who have not been deprovisioned can often sign into applications long after their departure and hackers with databases of stolen passwords can attempt brute force attacks that might get them access to sensitive data without company awareness.

    OneLogin provides IT with the ability to drastically reduce the security exposure by controlling access to applications as well as automating user on/off-boarding. This webinar will introduce best practices in federating identity across thousands of applications, streamlining employee on-boarding and cloud application provisioning, and optimizing identity services to drive the business.
  • Integrated Cloud Security Recorded: Jul 23 2015 36 mins
    Abhishek Lahoti, Dropbox for Business | Samer Baroudi, OneLogin | James Mullaly, Bigos Management
    How to Align Identity Management and Access Control with Content and Collaboration

    The impetuses for cloud app adoption are still in full force: greater accessibility, elastic licensing, reduced infrastructure and improved business agility, among others, are creating new and exciting ways to reduce IT costs and complexity and meanwhile improve productivity and profitability. While the benefits are clear, technology leadership are still apprehensive due to key considerations around security and access control. Business-critical information now lives outside the traditional corporate perimeter while IT has little visibility and control over the apps and devices being used. Technology leaders and end users alike are seeking simple and secure application access.

    Join us in this session where we explore key trends, challenges and solutions from OneLogin and Dropbox, and how real estate management company Bigos Management has delivered secure and convenient access to their cloud applications to their workforce.In this session, you will learn:

    - Why Identity and Access Management is important today
    - How IAM fits into a broader cloud security program
    - How IAM aligns with File Storage and Collaboration
    - How Bigos Management has successfully leveraged OneLogin and Dropbox in their business
Securely Connect Every User, App, Device and Directory
Innovative Identity Management Solution That Actually Makes Life Easier.

Empower employees, customers and partners with secure access to your cloud and company apps on any device. Transform your enterprise security and centralize control of users, apps and devices.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
  • Live at: May 17 2016 4:00 pm
  • Presented by: Garrett Bekker, Senior Analyst, Information Security at 451 Research; David Meyer, VP Product at OneLogin
  • From:
Your email has been sent.
or close