Hi [[ session.user.profile.firstName ]]

Get Enterprise Provisioning Right Finally

Discover how to take the risk out of enterprise identity and access management by managing the challenges of distributed applications and an ever-changing workforce.

This webinar discusses what to look for in an IAM / IAG solution, and shows best practice examples of:

- How to react to business changes within the user lifecycle
- How to ensure people's permissions and access are appropriate to the business function they perform
Recorded Apr 25 2019 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alex Binotto - Sr. Product Manager, One Identity
Presentation preview: Get Enterprise Provisioning Right Finally

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How Three Simple Steps Can Better Protect Against a Data Breach Recorded: Oct 1 2019 46 mins
    Alan Radford and Zoltan Bakos
    In today’s world, data is more valuable than oil and data breaches are more prevalent than ever.
    And a common way that hackers succeed in getting to data is to search for and steal privileged credentials. These accounts have unlimited access to infrastructure and data. And often, with traditional approaches to privileged access management (PAM), privileged accounts are accessed via shared passwords and user activities are not tracked, which makes investigating breaches and preventing future break-ins very difficult.

    But that doesn’t have to be the experience for your organisation.

    Join our free webcast to learn three simple – yet critical – steps you can take with your PAM strategy to protect your data.

    This interactive webcast will help you answer the following questions:

    •Do you know who has access to your backend systems?
    •Do you know how they are protected?
    •Can you prove it when challenged?
  • Get Enterprise Provisioning Right Finally Recorded: Apr 25 2019 46 mins
    Alex Binotto - Sr. Product Manager, One Identity
    Discover how to take the risk out of enterprise identity and access management by managing the challenges of distributed applications and an ever-changing workforce.

    This webinar discusses what to look for in an IAM / IAG solution, and shows best practice examples of:

    - How to react to business changes within the user lifecycle
    - How to ensure people's permissions and access are appropriate to the business function they perform
  • The changing face of Privileged Access Management Recorded: Apr 25 2019 41 mins
    Tyler Reese, One Identity
    Discover how a next-generation PAM solution can help your organisation address common challenges such as:

    - How to secure solutions that protect privileged accounts
    - How to satisfy both auditors and admins with frictionless security
    - How to leverage the cloud without sacrificing security
  • Gartner analyst covers all things security, risk and governance Recorded: Apr 24 2019 61 mins
    Brian Iverson, Gartner
    This informative webcast contains great insights from Gartner analyst Brian Iverson, which begins with a simple and pragmatic definition for “what is governance?”

    Brian also discusses challenges, pitfalls and recommendations on:

    - How organizations can mitigate the risk of a breach
    - How to prepare for hackers
    - Ways to ensure the right people have the right access
    - Overcoming governance challenges with apps, unstructured data, the cloud and personal devices
    - Breaches that bypass the perimeter
    - Creating a holistic security approach: What are the risks of doing things and not doing things

    It can be a difficult task to achieve governance if you don’t have the right solutions. That’s why the second part of this webcast focuses on solutions to help you enhance your identity governance capabilities.
  • Achieving End-to-End Governance Recorded: Apr 18 2019 36 mins
    Alex Binotto - Sr. Product Manager, One Identity
    Governance, or the process of ensuring that access is correct and provable across the entire enterprise, is the pinnacle of IAM maturity. But often governance is tackled as an afterthought that prevents its true benefits from manifesting.

    An end-to-end approach to governance that is built in from the start, includes not only user access but also access to data and privileged accounts, and places the visibility and control in the hands of the line-of-business. This webinar will show you how this is not only possible but easily achievable.
  • Identity Lifecycle Management in a hybrid AD environment Recorded: Apr 17 2019 30 mins
    George Cerbone, Solution Architect, One Identity
    Expand your on-premise implementation of identity to the cloud and help to get IAM right. Learn how to overcome the shortcomings of native tools and streamline and automate one of the most troublesome IAM activities in a hybrid environment.
  • Innovate and Transform and Become the Next Uber or Amazon Recorded: Apr 16 2019 53 mins
    George Cerbone, Solution Architect, One Identity
    Learn how IAM solutions can enable managers to define and enforce the policies of their on-prem, hybrid and cloud governance policies.
  • 8 Ways to Analyze Privileged Sessions to Identify Your Most Suspicious Activity Recorded: Apr 14 2019 86 mins
    Randy Franklin Smith, Windows Security Subject Matter Expert and Richard Hosgood, One Identity
    Discover how privileged session manager and behavioral analytics can help identify compromised privileged credentials. Randy Franklin Smith and One Identity’s Richard Hosgood discuss a number of ways you can keep up security even after privileged users have logged in, including by monitoring keystrokes and mouse movements to reveal intruders using compromised privileged credentials.
  • How to make your IAM program a success Recorded: Apr 11 2019 61 mins
    Martin Kuppinger, KuppingerCole; Wolfgang Zwerch, Munich Re; Paul Walker, One Identity
    Discover how to make your IAM programs successful from interviews with industry experts. This webinar highlights 5 common reasons why IAM projects might fail; gives 8 recommendations for running successful IAM projects and identifies 6 IAM upcoming trends.
  • How can you regain the control of your privileged accounts? Recorded: Jun 13 2018 57 mins
    Csaba Krasznay, PhD.
    Balabit, a One Identity business, presents some shocking research statistics and instructive breach stories involving the misuse of privileged credentials.

    Balabit’s global research showed that 4 in 5 companies were hit by a breach in 2017. In this kind of landscape, with both cyber-attacks and privileged users proliferating simultaneously – and with the GDPR re-framing our relationship with data security – now’s the time for IT teams to get better control of their networks.

    In our 45-minute webinar session, you’ll hear about our key research findings and recommendations to reduce your risks related to privileged accounts. The webinar will be held by Csaba Krasznay, PhD., CISSP, Security Evangelist and Program Director of Cybersecurity Academy at the National University of Public Service in Hungary.
  • Managing privileged access and operations and ensuring GDPR compliance Recorded: May 16 2018 46 mins
    Istvan Molnar, Ronald Schmid
    As GDPR is now in force, Balabit, a One Identity business, launched this webinar session for organizations facing difficulties in terms of managing privileged user access to personal data storage units.

    When it comes to managing privileged access and users there is more to it than preventing unauthorized access to Personal Data. Compliance to the GDPR is heavily dependent on monitoring workflows and ensuring that all processes align with the requirements.

    Join us on our 30 minute webinar session where you can find out how to manage privileged access and operations to ensure GDPR compliance with the help of Balabit's Privileged Session Management.
  • Understanding Privileged Identity Theft Recorded: Oct 12 2017 55 mins
    Csaba Krasznay
    Cyber attackers use privileged identity theft, the compromise of credentials to privileged accounts, to steal massive amounts of data. To protect themselves, organizations need to understand the threat and how to implement the right security measures.

    From this 55-minutes on-demand webinar session you will learn about the methods used to compromise privileged accounts, why hackers target privileged accounts, why current security measures fail, and what steps you can take to stop these threats.
  • Accelerate Your Incident Response with Privileged Access Management Recorded: Jul 6 2017 53 mins
    Csaba Krasznay
    Following an incident, the simple question “Who did what?” is one of the most critical, yet most difficult, questions to answer.

    From this 52-minutes on-demand webinar session, you will learn incident investigation best practices. We present a real-life incident investigation scenario and show how advanced privileged access management tools can help you in the forensics process related to privileged account misuse.
One Identity - Identity and Access management
One Identity, a Quest Software business, helps organizations get identity and access management (IAM) right. With a unique combination of offerings including a portfolio of identity governance, access management and privileged access management. More than 7,500 customers worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their data -- wherever it might reside.

For more information, visit http://www.oneidentity.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Get Enterprise Provisioning Right Finally
  • Live at: Apr 25 2019 10:30 am
  • Presented by: Alex Binotto - Sr. Product Manager, One Identity
  • From:
Your email has been sent.
or close