Hi [[ session.user.profile.firstName ]]

PAM without borders - a cloud first approach

As organisations embrace cloud technologies, there is a rise in multi-cloud strategies where more than one cloud provider is being used. This can lead to more complexity around managing security and compliance if a tailored strategy around IAM and PAM is not used.

Centrify Privileged Access Service provides a cloud-first platform that can address your business needs in these challenging new environments.

The webinar will cover:
•What is (multi-)cloud, and what organisations learnt from their first attempts at using it?
•What cloud vendors propose, and how this is insufficient
•The Centrify Privileged Access Service platform
•2 simple use case demonstrations
Recorded May 7 2020 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kev Smith, Technical Director, EMEA at Centrify
Presentation preview: PAM without borders - a cloud first approach

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • PAM 101: Cloud Oct 1 2020 6:00 am UTC 60 mins
    Chris Owen, Director of Product Management
    CLOUD PAM, WHAT IS IT?

    Digital transformation is at the heart of organizations embracing cloud technologies. As we make this shift to the cloud, our approach to Privileged Access Management (PAM) needs to be re-defined in order to protect access to the cloud and workloads within the cloud.

    Join our webinar as we take things back to the basics; taking a look at what Cloud PAM really is, and how it can enable you to reduce risk within your environment. We’ll look over the following key areas:

    - The adoption of cloud and multi-cloud
    - Protecting access to the cloud and workloads in the cloud
    - What is cloud PAM?
    - The different types of cloud PAM solutions
    - Key Gotcha’s and things to watch out for
  • PAM 101 Recorded: Aug 27 2020 58 mins
    Chris Owen, Director of Product Management
    WHAT IS PRIVILEGED ACCESS MANAGEMENT (PAM)?

    With so many names, acronyms and vendor capabilities, understanding PAM can be a challenge.

    Join us for this live webinar to learn what Privileged Access Management is and how PAM can enable you to reduce risk within your environment. We will review over the following key areas:

    - What is Privileged Access Management
    - Key objectives we see in every PAM project
    - The history and evolution of PAM
    - Key "gotchas" and things to watch out for
    - The PAM maturity model
  • AD Bridging and MFA Everywhere with Centrify Recorded: Aug 18 2020 31 mins
    Michael Woo, Systems Engineer
    Enterprise organisations now exist in a mixed hybrid environment, with workloads running in the cloud and on prem, either on Windows or Linux. Traditionally this is a headache for system administrators having to manage multiple credentials across Active Directory and local Linux accounts.
    Simplify and Centralise with Centrify by allowing users to logon with their AD credentials and have MFA enforced on a Linux/Unix host.
    Granular controls allow privilege elevation down to the command executed with MFA enforcement ensuring identity is verified at each stage.

    This webinar will cover these aspects and a demonstration on how Centrify can help you achieve this.
  • An Identity-Centric Approach to Privilege Management in the Cloud Recorded: Jun 16 2020 57 mins
    Chris Owen, Director of Product Management
    Cloud adoption is changing the privileged access management landscape. PAM tools were originally designed to protect assets within our data centre, within our directory, physical and virtual servers under our control and applications under our management. As enterprise organisations are adopting public cloud with not just one vendor, often multiple vendors, our challenge of securing privileges and reducing risk becomes more complex. Join us for this webinar where we’ll discuss some of the challenges with privilege management in the cloud and how an identity-centric approach enables you to reduce your risk of exposure.
  • Dissecting Just-in-Time PAM Recorded: Jun 4 2020 48 mins
    Tariq Jitan, Systems Engineer - MEA, Centrify
    Join this webinar to find out:

    - Key challenges of a basic PAM tool
    - What is Just-in-Time PAM?
    - Just-in-Time approaches
    - Demonstrations of Centrify's approach
  • Identity Centric PAM - Protecting the new security perimeter for multi-cloud Recorded: May 21 2020 56 mins
    Marco Zhang, Director of Systems Engineering APJ at Centrify
    Emerging technologies fuelling digital transformation are reshaping the enterprise IT environment. As organizations continue their digital transformation journeys, they struggle to manage an infrastructure that is fragmented across hybrid- and multi-cloud environments, resulting in data breaches, audit findings, and unnecessary overhead costs.

    Underlying the foundation of digital transformation are privileged access controls, which ensure that only authorized individuals, machines, or services are permitted to access the right resources, at the right time, for the right reasons. Centrify enables digital transformation at scale, modernizing how organizations secure privileged access across hybrid and multi-cloud environments by enforcing Identity-Centric PAM based on Zero Trust principles.

    The webinar will cover:

    •The new security perimeter
    •PAM challenges in multi-cloud
    •Critical use cases for multi-cloud
    •Demonstration
  • Was ist Just-in-Time Privilege Access Management Recorded: May 20 2020 47 mins
    Achim Ziermann, Systems Engineer DACH, Centrify
    Die Anzahl der Einbrüche in Unternehmensnetze ist in den letzten Jahren explodiert. Organisationen müssen erkennen, das Perimeter basierte Sicherheit gegen die größte Bedrohung, der Missbrauch von privilegierten Konten, nicht mehr ausreichenden Schutz bietet. Organisationen, die ein PAM System nutzen und nur Passwörter in einem Tresor oder Password Manager verwalten, laden durch fehlende Funktionen zum Missbrauch ein.

    Die Themen des Webinars:

    •Zentrale Herausforderungen eines PAM Tools
    •Was ist “Just-In Time PAM”
    •Just-In-Time Konzepte
    •Demonstration der Centrify Konzepte.
  • Improve Your SAMA Compliance Posture with Identity-Centric PAM Recorded: May 11 2020 51 mins
    Dr. Torsten George, Cyber Security Evangelist at Centrify, Samer Jadallah Vice President, KSA & Bahrain at StarLink
    In an era when cyber-attacks have become common occurrences, it's vital for the Saudi Arabian Banking, Financial Services, and Insurance (BFSI) industry to improve its cyber resilience. In this context, the SAMA Cyber Security Framework offers a comprehensive set of best practices that are quite prescriptive by nature. However, becoming and staying compliant in today’s dynamic threatscape is often challenging.

    Don’t miss out on this webcast to learn how to address today’s #1 attack vector ― privileged access abuse ― and surpass SAMA’s regulatory mandates.

    The webinar will cover the following topics:
    • SAMA Cyber Security Framework Overview
    • Current Market Drivers
    • The Role of Privileged Access Management (PAM) in Cyber Security
    • How to Meet SAMA IAM Requirements with Identity-Centric PAM

    Register for access to the live or on-demand webinar after the live event.
  • PAM without borders - a cloud first approach Recorded: May 7 2020 51 mins
    Kev Smith, Technical Director, EMEA at Centrify
    As organisations embrace cloud technologies, there is a rise in multi-cloud strategies where more than one cloud provider is being used. This can lead to more complexity around managing security and compliance if a tailored strategy around IAM and PAM is not used.

    Centrify Privileged Access Service provides a cloud-first platform that can address your business needs in these challenging new environments.

    The webinar will cover:
    •What is (multi-)cloud, and what organisations learnt from their first attempts at using it?
    •What cloud vendors propose, and how this is insufficient
    •The Centrify Privileged Access Service platform
    •2 simple use case demonstrations
  • PAM sans frontières - Une première approche du Cloud - Le 10 mars 2020 à 10h30 Recorded: Mar 10 2020 24 mins
    Frank Leavis, Senior Systems Engineer, EMEA chez Centrify
    Ce webinaire couvrira les points suivants:
    - Qu'est-ce que le (multi) cloud et quels enseignements les organisations ont-elles tirées de leurs premières tentatives d'utilisation?
    - Ce que proposent les fournisseurs de Cloud et pourquoi cela est insuffisant
    - La plateforme Centrify Privilege Access Service
    - 2 démonstrations de cas d'utilisation simples
  • Dissecting Just-in-Time PAM Recorded: Mar 5 2020 60 mins
    Marco Zhang, Director of Systems Engineering APJ, Centrify
    Join this webinar to find out:

    - Key challenges of a basic PAM tool
    - What is Just-In Time PAM
    - Just-In-Time approaches
    - Demonstrations of Centrify's approach
  • EMEA: Anatomy of a Hack: Perception vs. Reality Recorded: Mar 3 2020 60 mins
    Chris Owen, Director of Product Management, Centrify.
    Join this webinar to learn the 3 major phases of the “cyber-attack lifecycle” (aka “kill chain”) and important measures for preventing data exfiltration, including:

    •Enforcing MFA
    •Using host-based auditing
    •Leveraging machine learning algorithms to monitor, identify, and alert on high risk activity
  • Securing Containers with Centrify Zero Trust Privilege Recorded: Dec 3 2019 47 mins
    Marco Zhang, Director of Systems Engineering APJ
    Join this webinar to find out:

    •Understanding container technologies
    •Major risks of container technologies
    •How Centrify Zero Trust Privilege helps to address these risks
    •Use Case Demonstrations
  • DevOps & Cloud Automation with Centrify Privileged Access Service Recorded: Nov 20 2019 40 mins
    – Kev Smith, EMEA Lead Systems Engineer, Centrify
    • What is DevOps?
    • Automation/orchestration use cases
    • How Centrify Privileged Access Service can help
    • 2 simple use case demonstrations
  • APJ: Exposing The Myths Around Passwords Vaults Recorded: Sep 10 2019 33 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    • How Password Vaults have evolved
    • The challenges in using today’s Password Vault solutions
    • How Centrify enables customers to operate without the overhead of legacy Vault solutions
    •The Zero Trust Privilege Management Approach
  • Danger! High Vault-age!: Exposing the myths around passwords vaults Recorded: Aug 21 2019 40 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    •How Password Vaults have evolved
    •The challenges in using today’s Password Vault solutions
    •How Centrify enables customers to operate without the overhead of legacy Vault solutions
    •The Zero Trust Privilege Management Approach
  • APJ: Successfully Implementing Credential Tiering Using Zero Trust Privilege Recorded: Jul 24 2019 54 mins
    Presenter – Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    - What is credential tiering?
    - Why is credential tiering a recommended control?
    - How to mitigate the risk of credential-based attacks
    - Centrify’s Zero Trust Privilege Management Solution
  • The Anatomy of a Hack: Perception vs. Reality Recorded: Jul 12 2019 56 mins
    Time Steinkopf, CEO Centrify, Andy Smith, VP Marketing, Centrify
    The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication. However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials.

    Watch Anatomy of a Hack: Perception vs. Reality webinar to learn about the 3 major phases of the “cyber-attack lifecycle” or “kill chain” and most importantly measures for preventing data exfiltration, including: Enforcing MFA; Using host-based auditing and monitoring; and Leveraging machine learning algorithms to monitor, identify, and alert on high-risk activity.
  • EMEA: Successfully Implementing Credential Tiering Using Zero Trust Privilege Recorded: Jun 18 2019 45 mins
    Chris Owen, Director of Product Management, Centrify
    Join this webinar to find out:
    •What is credential tiering?
    •The impact of credential-based attacks on users
    •How to mitigate the risk of credential-based attacks
    •How to effectively implement credential tiering using Centrify’s Zero Trust Privilege
  • Debunked: 5 Myths About Zero Trust Security Recorded: Feb 18 2019 60 mins
    Tony Goulding, Director of Technical Marketing, Centrify; Torsten George, Senior Director Product Marketing, Centrify
    In 2018, Zero Trust Security gained popularity due to its simplicity and effectiveness. Yet despite a rise in awareness, many organisations still don’t know where to start or are slow to adopt a Zero Trust approach.

    The result? Breaches affected as many as 66% of companies just last year. And as hackers become more sophisticated and resourceful, the number of breaches will continue to rise.

    Unless organisations adopt Zero Trust Security. In 2019, take some time to assess your company’s risk factors and learn how to implement Zero Trust Security in your organisation.

    Getting started is easy. Watch today to hear from Tony Goulding, Director of Technical Marketing and Torsten George, Senior Director, Product Marketing as they:

    - Review 4 essential pillars of Zero Trust Security
    - Debunk 5 major myths about Zero Trust
    - Share best practices to ensure a successful implementation
Regular live & on demand webinars for CISOs and IT professionals
Centrify’s channel provides webinars that will inform and educate on Privilege Access Management. Centrify’s Zero Trust Privilege redefines legacy Privileged Access Management (PAM) for the modern enterprise IT threatscape. Organisations must discard the old model of “trust but verify”, which relied on well-defined boundaries. Zero Trust mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: PAM without borders - a cloud first approach
  • Live at: May 7 2020 9:00 am
  • Presented by: Kev Smith, Technical Director, EMEA at Centrify
  • From:
Your email has been sent.
or close