InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Not Just SAML: How to Extend your Identities to Multi-Cloud & Private Resources

Presented by

Noa Zilberman, Co-Founder and Chief Product Officer of Odo Security (Acquired by Check Point)

About this talk

How do you extend your current identity provider to connect to multi-cloud environments? How do you use your current user store to single sign-on (SSO) into private servers? We all know that SAML lets you single sign-on to SaaS apps. But how do you extend those same enterprise identities to securely connect and SSO into sensitive resources such as production servers, remote desktops (RDP), terminals (SSH), databases (SQL) and homegrown web apps? Join this session to learn: • Why identity based access policies are key to securing access for any user • How Zero Trust Network Access (ZTNA) architectures tighten enterprise security • Privileged access management (PAM) for DevOps access to multi-cloud • Perks of ZTNA for BYOD and third parties • Operational and auditing efficiencies offered by ZTNA for private access Stay one step ahead with the latest innovations in secure multi-cloud access!
Check Point Software

Check Point Software

58802 subscribers421 talks
The Leading Cyber Security Platform
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.
Related topics