Hi [[ session.user.profile.firstName ]]

Mastering AWS IAM: Using Automation to Secure Access to AWS

For many companies, Amazon Web Services is the foundation of their software apps, containing valuable software code that is critical to protect. Join us to learn about mistakes to avoid when using AWS Identity and Access Management (IAM) - and how to address them.

AWS solution architect will touch on Federated Users, Trust & Access Policies and AWS Organizations, and you’ll see a demo of how to set up a secure OneLogin+AWS deployment.

In this webinar you will learn:

- IAM misconfigurations made by AWS customers
- Best practices for AWS access security
- How to extend AWS IAM security using SAML integration, Multi-Factor Authentication, and AWS Roles
- How to get your own Free OneLogin for AWS Account
Recorded May 17 2018 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Scott Ward, Solutions Architect, AWS, Nathan Chan, Solutions Architect, OneLogin, Jonathan Bennun, PMM, OneLogin
Presentation preview: Mastering AWS IAM: Using Automation to Secure Access to AWS

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 3 Steps to Unleash the Power of ServiceNow with OneLogin and Clear Skye Recorded: Aug 29 2018 55 mins
    James Herbert, Solutions Engineer, OneLogin, TJ Gryziec, Chief Product Officer, Clear Skye
    Are you looking to strengthen identity governance and risk management for compliance initiatives like GDPR? Or to automate enterprise access management?

    Today’s enterprises handle a growing volume of unique identities and applications and the process is only getting more complex. The combination of complex web of identities and manual workflows for application provisioning, compliance reporting, and access fulfillment, leads to massive inefficiencies and potential risk.

    With Clear Skye and OneLogin, ServiceNow customers achieve a single system of record for all enterprise identities and access management. Additionally, the joint solution integrates seamlessly with ServiceNow GRC and provides evidence for auditing and IT compliance.

    Join us on Wednesday, Aug 29th at 10 am PST to hear from security experts from OneLogin and Clear Skye on how to automate identity orchestration for enhanced security and compliance on ServiceNow.

    In this webinar, you will learn how to:

    - Simplify identity management on ServiceNow including real time user provisioning and deprovisioning
    - Build automation processes to reduce risk and extend service management
    - Fast track your GDPR or other compliance initiatives
  • How to Kill VPNs While Ensuring Zero Trust Security Recorded: Aug 1 2018 35 mins
    Sam Rhea, Product Manager, Cloudflare, Gary Gwin, Director of Product, OneLogin
    Many enterprises rely on VPNs and other “boxes” to enable application access for employees and contractors. These types of approaches have challenges maintaining, deploying and enforcing user access policies. They lack granular application access controls. Authenticating users by identity is difficult or non-existent. And user experience is slow, especially for those on mobile devices. Cloudflare and OneLogin have partnered to help companies extend Zero Trust Security to Secure SaaS and On-Premises Applications across the enterprise.

    Join this webinar and learn:

    - Why zero-trust security is the model state for today’s enterprises
    - Transitioning from VPNs while still providing seamless, secure access inside and outside the firewall
    - How OneLogin and Cloudflare can help you extend zero-trust across your entire environment
  • The Critical Steps to Deploying MFA at Enterprise Scale Without Regrets Recorded: Jun 21 2018 53 mins
    Jeffrey Broberg, Sr. Director, Mobile Product Management; OneLogin, Michael Gleason, Sr. Manager, Product Marketing; OneLogin
    You know 81% of hacking-related breaches involve stolen or weak credentials (Verizon Data Breach Investigation Report, Verizon, 2017). You know your users are targeted by more phishing attacks than ever before. You even know Multi-Factor Authentication (MFA) is your best weapon in defending against cybercrime.

    But how do you wrap your head around an MFA project at enterprise scale? What product capabilities are essential? And how do you cut down on the time it takes to scope, deploy, and operationalize a solution?

    Join Jeffrey Broberg, Sr. Director of Mobile Product Management at OneLogin and Michael Gleason, Sr. Manager, Product Marketing at OneLogin for a webinar where you will learn:

    - Why a successful MFA deployment represents the ultimate effort-to-impact security project
    - Why choosing an Identity Provider with built-in MFA functionality is the ultimate IT + Security twofer
    - How to smash the security vs. productivity paradigm with dynamic authentication
    - How to deploy and operationalize in hours or day instead of months by deploying MFA in front of your Single Sign-On (SSO) solution
  • HR-driven Identity Management with Stitch Fix and OneLogin Recorded: Jun 6 2018 31 mins
    Ravindra Sunku, Director of IT, Stitch Fix, James Herbert, Solutions Engineer, OneLogin
    Learn how to integrate your HRIS and Identity Management platform to streamline onboarding and offboarding, automate user management and drive efficiency.

    Hear how a small IT and HR team at Stitch Fix collaborated to design and implement a best of breed solution with Workday HCM and OneLogin in a highly complex, fast-growth environment with thousands of remote and seasonal users while saving hundreds of thousands of dollars per year.

    Watch this webinar to learn:

    - Best practices for integrating Workday with your identity toolset
    - How IAM integration and automation drive user engagement with Workday - - - HCM as the single source of truth for corporate HR data
    - How a pleasant onboarding experience enables rapid productivity with ongoing provisioning savings
    - How HR-driven identity is well suited for Retail environments with seasonal rehires
  • Securing Access to On-prem and SaaS Environments with Cloud Based IAM Recorded: May 31 2018 51 mins
    Merritt Maxim, Senior Forrester Analyst, Forrester Research
    Despite the rapid enterprise adoption of SaaS, many organizations still rely on a hybrid mix of on-premise and SaaS apps to run their business, creating administrative challenges and inefficiencies.

    Identity-as-a-service (IDaaS) solutions have evolved to provide business and security professionals with a viable and compelling alternative to traditional IAM options. Besides delivering all the great cloud benefits, cloud-based IAM offerings can integrate with on-premise environments to increase business agility, reduce operational inefficiencies, mitigate identity risks, and improve real-time visibility for today's hybrid enterprise.

    Join featured speaker Merritt Maxim, Senior Analyst at Forrester Research, as he discusses the state of IDaaS in the context of new architectures and real world use-cases, including:

    – Current IDaaS Market Trends
    – Critical considerations for building an IDaaS architecture & strategy
    – Challenges in extending on-premises
    – IAM approaches to the cloud
    – Key benefits from deploying IDaaS in hybrid environment
    – Quick Demo of OneLogin IDaaS solution for hybrid environment
  • Mastering AWS IAM: Using Automation to Secure Access to AWS Recorded: May 17 2018 60 mins
    Scott Ward, Solutions Architect, AWS, Nathan Chan, Solutions Architect, OneLogin, Jonathan Bennun, PMM, OneLogin
    For many companies, Amazon Web Services is the foundation of their software apps, containing valuable software code that is critical to protect. Join us to learn about mistakes to avoid when using AWS Identity and Access Management (IAM) - and how to address them.

    AWS solution architect will touch on Federated Users, Trust & Access Policies and AWS Organizations, and you’ll see a demo of how to set up a secure OneLogin+AWS deployment.

    In this webinar you will learn:

    - IAM misconfigurations made by AWS customers
    - Best practices for AWS access security
    - How to extend AWS IAM security using SAML integration, Multi-Factor Authentication, and AWS Roles
    - How to get your own Free OneLogin for AWS Account
  • How to Harden Your MFA with Machine Learning Recorded: Apr 19 2018 57 mins
    Merritt Maxim, Senior Forrester Analyst, Forrester Research, Al Sargent, Sr. Product Marketing Director, OneLogin
    For security teams who need to reduce the risk of account takeovers, static multi-factor authentication (MFA) is a thing of the past for catching new security risks. Legacy MFA providers that use static rules miss high-risk login and miss security risks. Machine intelligence is now required to determine whether to prompt users for MFA using a broad set of inputs, including networks, geography, devices and time.

    Learn how to detect a broader set of attacks and strengthen your company’s security posture.

    In this learning session, OneLogin’s Al Sargent joins Forrester Senior Analyst, Merritt Maxim to dissect the current state of MFA and highlight the role of machine learning to advance the state of corporate security.
  • How to Reduce Data Breaches with Cloud-authenticated Laptops Recorded: Apr 5 2018 61 mins
    Maxim Merritt, Senior Forrester Analyst, Forrester Research, Al Sargent, Sr. Product Marketing Director, OneLogin
    Your company may be overlooking a big security gap. Despite the rapid adoption of SaaS or web applications by enterprises, many of them still rely on on-premises Active Directory (AD) to manage password policies and authenticate laptops.

    This approach worked in 2000 when every employee used a PC behind a firewall. Fast forward 17 years later, corporate laptops are used remotely and Macs and a flexible workforce of contractors are becoming common. Many of these laptops are excluded from corporate security policies password requirements. Once stolen or compromised, this leaves companies with widespread security gaps waiting to be exploited.

    Join OneLogin’s Al Sargent and guest speaker Forrester’s Senior Analyst, Merritt Maxim, as we discuss:

    - Today’s widespread security gaps and their economic impacts
    - A new approach to Identity and Access Management to manage security issue
    - Hardening enterprise’s endpoints while moving to the cloud, without disrupting existing identity architectures
  • Hybrid Access Management for both On-Prem and Cloud Apps Recorded: Mar 29 2018 61 mins
    Anil Goel, IAM Architect, Wipro, Gary Gwin, Director of Product, OneLogin
    If you work with legacy Web Access Management (WAM) products, you know what a pain they are. Policy server sprawl. Ancient code. Nightmarish support. Difficult upgrades. It doesn’t have to be like this.

    Watch this webinar to learn how they helped an established, 100-year-old enterprise implement an identity solution that integrates a wide range of on-premises and SaaS applications — fast, seamlessly, and securely.

    In this session, Wipro’s Anil Goel (IAM Architect) and Geetha Hari (Global IAM Solutions Lead) join forces with OneLogin’s Gary Gwin (Director of Product) to show how you can plan and execute your escape legacy WAM hell.
  • Myths & Realities of Multi-factor Authentication: The CISO Perspective Recorded: Mar 22 2018 33 mins
    Stephen Lawton, Special Projects Editor, SC Magazine, Alvaro Hoyos, CISO, OneLogin
    Passwords alone won’t cut it in the days of sophisticated phishing, spoofed email and social engineering attacks. High-profile security breaches are making headlines weekly, and the number of incidents continues to rise. Multi-factor authentication (MFA) has become the go-to tactic to prevent malicious parties from accessing sensitive corporate data. While MFA provides undeniable value, conventional MFA solutions are difficult and time-consuming to implement with end-user usability implications.

    Watch this informative on-demand webcast hosted by SC Magazine featuring OneLogin’s, CISO, Alvaro Hoyo as we uncover the current state of MFA and the tangible security value it provides, plus key elements of a successful MFA strategy.
  • The Emergence of Unified Access Management Recorded: Mar 19 2018 40 mins
    Garrett Bekker of 451 Research, Miles Kelly of OneLogin and Gary Gwin of OneLogin
    Today, the vast majority of organizations struggle to manage complex application environments consisting of a growing portfolio of SaaS applications as well as commercial off-the-shelf and custom web apps hosted on-premises, at remote data centers, and in private clouds. Organizations are further challenged to manage access to applications, networks, and devices for users stored in disparate directories.

    The Future of Access Management is here. Join 451 Research’s Sr. Analyst Garrett Bekker, OneLogin’s CMO Miles Kelly and Director of Product Gary Gwin as they unveil a new way to unify access to both SaaS and on-premises applications, as well as access to networks and devices, all with a single Identity-as-a-Service (IDaaS) solution.
  • How To Prepare for Intensifying Cyber Security Risks in 2017 Recorded: Dec 15 2016 58 mins
    Andras Cser VP and Principal Analyst, Forester, Al Sargent Sr. Director Product Marketing, OneLogin
    Applications are under siege, and successful application attacks are the source of the biggest data loss. While there isn't an "easy" button for cyber security, there are some proven initiatives security professionals can take to ensure employees can seamlessly access the right applications - while keeping corporate data secure.

    Join guest speaker, Andras Cser from Forrester and OneLogin as we discuss key predictions for 2017, and outline how you can automate secure access to your applications, laptops, and mobile devices in a rapidly evolving landscape. Don't miss the experience, without compromising security.
  • Stop Hackers with Integrated CASB & IDaaS Security Recorded: Dec 7 2016 54 mins
    CloudLock: Brad Pielech - Integrations Architect, CloudLock OneLogin: Mario Tarabbia - Director of Sales Engineering
    Your organization has turned to cloud platforms and applications (including SaaS, IaaS, PaaS, and even IDaaS) to meet business needs, and it’s your job to make sure those applications are both easily accessible as well as airtight. Luckily, a new set of identity and security solutions have arrived that ensure fast access and security around all your publicly accessible data,w the apps it resides on, and the users engaged.

    Find out how OneLogin’s identity and access management capabilities including single sign on (SSO), combined with CloudLock’s cloud cybersecurity solution can make users more secure and productive in the cloud, no matter the data, applications, or people they work with.

    Join OneLogin and CloudLock to learn how to:

    – Identify the top five cyber threats to your cloud environment
    – Protect against cloud security risks leveraging advanced user behavior analysis
    – Improve company-wide productivity through streamlined identity and access management
    – Easily automate your cloud access management process
    – Put it all into action quickly – managing cloud application security with a powerful IDaaS+CASB joint solution
  • Secure Your Company in 2017: Four Key Initiatives Recorded: Nov 8 2016 63 mins
    Garrett Bekker Senior Analyst, Information Security at 451 Research, Al Sargent Sr. Director Product Marketing at OneLogin
    Risk flows to the least-secure. Hackers will target what they see as the weakest link. Given the unrelenting security attacked we've seen in 2016 - and their high costs - you don't want your company to be seen as a target in 2017.

    Join 451 Research and OneLogin as we explore the current state of identity security and share best practice findings on what security initiatives you should pursue in 2017, including:

    HR-driven IDaaS for high-integrity on- and off-boarding
    Automated threat response with CASB/IDaaS integration
    Application threat aware integration with IDaaS/SIEM integration
    Unified Endpoint Management to extend cloud security to all devices
  • Prevent Laptop Security Breaches, No Active Directory Required Recorded: Sep 22 2016 63 mins
    Al Sargent Sr. Dir. Product Marketing, OneLogin and Tal Herman Lead Product Manager, Identity, OneLogin
    It only takes one unsecured laptop for a security breach to occur. OneLogin Desktop can fix that. Cloud-first companies can use it to secure laptops by connecting them to our cloud directory. Companies with Active Directory can use it to secure laptops that aren’t domain-joined -- Macs, or PCs used by non-employees.

    Join our live webinar to find out how OneLogin Desktop can help you:

    Extend strong authentication policies to all your laptops, including operating system password complexity, rotation, and uniqueness
    Implement frictionless multi-factor authentication that secures all SaaS application access without impacting employee productivity
    Reduce service desk loads by presenting end users with a simplified sign-in experience that reduces password-reset requests.
  • Secure Your Company from the SaaS Tsunami Recorded: Sep 8 2016 64 mins
    Al Sargent, Sr. Dir. Product Marketing, OneLogin, Michael Gleason, Product Marketing Manager, Cloudlock
    According to Gartner, a staggering 600 to 1000 SaaS apps are in use at a typical company, yet IT only knows about & manages ~7%. The unmanaged ~93% pose very real security and compliance challenges including unauthorized access, data leakage, and violation of industry regulations.

    Gartner calls this the "SaaS Tsunami". It grows daily as employees sign up for new SaaS apps using corporate credentials -- all it takes is a browser, a credit card, and an expense report - two clicks and they’re in. Join us for an interactive webinar on how to bring unmanaged SaaS apps out of the shadows to reduce security and compliance risks.

    By joining this webinar, you will:

    - Quantify the scope of the SaaS Tsunami and its security impact on your business
    - Learn how to discover and manage previously unknown apps
    - Be quick on your feet and take action when risk is introduced
    - See a demo on how you can mitigate the security threats posed by the SaaS Tsunami
  • Simplify Your Google Apps Collaboration and Management with IDaaS Recorded: Aug 18 2016 44 mins
    Nathan Chan, Solutions Architect at OneLogin
    Google Apps for Work is a preferred solution for productivity and collaboration in the modern enterprise. But with a large suite of tools, proper provisioning and maintenance is anything but easy. Attempting to roll out Google Apps to the right users with the right access often results in over-extended IT resources, delayed employee on- and off-boarding, and misallocated access to key documents and data.

    It doesn’t have to be this way. Hundreds of organizations are using OneLogin’s best-in-class directory integrations to achieve faster Google Apps time-to-value and on-going application security and automation.

    Join OneLogin for an informative webinar designed to get you through the most complex of Google Apps deployments.
  • Fast Track Your Office 365 Deployment and Beyond Recorded: Aug 9 2016 36 mins
    OneLogin Solutions Engineer Nathan and Chan Mustafa Ebadi, VP of IT & Services at SOTI
    Whether you’ve just purchased Office 365 or have been using it for a while, deploying and managing safe access to Office 365 is not simple, fast, or pleasant. It’s your job to get the most value from your application investments, and while Microsoft has tools to assist like ADFS and DirSync, they are not only cumbersome and costly to maintain, but do not meet industry standards that can be scaled across your organization. And let’s face it, you’re not just implementing Microsoft products. Can you extend ADFS beyond Office 365 in a timely matter?

    Join OneLogin and customer SOTI, a proven product innovator and EMM Industry leader in mobile consulting, for an informative webinar about deployment best practices for Office 365 integrated with Active Directory.
  • IDaaS: Modernize Your IAM in the Cloud Recorded: Aug 2 2016 44 mins
    Nathan Chan, Solutions Architect at OneLogin and Al Sargent, Senior Director of Product Marketing at OneLogin
    IT, Security, and IT infrastructure teams are faced with a complex set of challenges, and identity and access management (IAM) done the old way tends to compound things. Companies who haven’t modernized their IAM infrastructure can spend months dedicated to setting up each new business application, both on premises and in the cloud, and another several months launching it to their users. It doesn’t have to be this way, with cloud-based solutions such as OneLogin reducing the time, effort, and risk of IAM modernization.

    Join us for an informative webinar with OneLogin presenters Nathan Chan, Solutions Architect, and Al Sargent, Sr. Director of Product Marketing.
  • Supporting Legacy Infrastructure on the Way to the Cloud Recorded: Jun 16 2016 47 mins
    Andras Cser, Principal Analyst at Forrester; David Meyer, VP Product at OneLogin
    Join featured speaker Forrester Principal Analyst Andras Cser and OneLogin VP Product David Meyer as they discuss how to protect legacy investments, while securely expanding cloud application portfolios and extending identity management to devices.

    The following topics will be covered:

    – Benefits of a unified cloud directory
    – Support for IT protocols including LDAP, RADIUS, and more
    – Support for directory consolidation
    – Secure access to WiFi, VPN, SSH, on-prem and cloud applications
    – Extending identity management to the device
    – Cloud-based replacement for on-premises Active Directory and LDAP directories
    – Demonstration of key IDaaS features
    – Q&A
Securely Connect Every User, App, Device and Directory
Innovative Identity Management Solution That Actually Makes Life Easier.

Empower employees, customers and partners with secure access to your cloud and company apps on any device. Transform your enterprise security and centralize control of users, apps and devices.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Mastering AWS IAM: Using Automation to Secure Access to AWS
  • Live at: May 17 2018 6:00 pm
  • Presented by: Scott Ward, Solutions Architect, AWS, Nathan Chan, Solutions Architect, OneLogin, Jonathan Bennun, PMM, OneLogin
  • From:
Your email has been sent.
or close