Hi [[ session.user.profile.firstName ]]

Top 10 Considerations When Choosing an SSO Solution

Single Sign-On (SSO) solutions are instrumental for controlling employee access to applications and systems. With SSO, companies leverage a central identity provider to manage user authentication and grant access to resources through a single set of login credentials. This enables companies to improve security through stronger password policies, increase productivity with simplified access to all the resources employees need to do their jobs, and make it easier for IT departments to meet compliance requirements around access.
With over 20 single sign-on solutions on the market, selecting the right one can be a big challenge. For example, large organizations that leverage Active Directory with multiple domains must consider how well an SSO solution integrates with their existing directory infrastructure. On the other hand, smaller IT teams might need to focus on whether a solution’s self-service capabilities can reduce the volume of help desk requests.
In this webinar, we will cover ten considerations that will help you to select the best SSO for your organization.
Recorded Jan 21 2021 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stas Newman, Director, Product Marketing
Presentation preview: Top 10 Considerations When Choosing an SSO Solution

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ransomware: How Privileged Access Management strategy mitigates risks May 18 2021 9:00 am UTC 46 mins
    Matthew Scott, Senior Sales Engineer & Massimo Carlotti, Solution Engineer Team Lead for CyberArk
    Ransomware have been making headlines again and again. Ransomware evolve and new ones like Maze are not only encrypting data and damaging business continuity, they also lead to public data leak of  confidential information. Learn how risks associated with the ransomware rise can be mitigated by implementing a comprehensive Privileged Account Management (PAM) strategy.
    CyberArk solution enables to mitigate the risk related to Ransomware by implementing least privilege approach and credential theft protection to prevent on the attack on the machines where it lands, combined with privileged credential rotation and isolation to block lateral movements and prevent the spread of the attack.
    During this webinar, you will discover the PAM programmatic approach that enables organizations to control this threat from end to end. The PAM approach allows you to secure the initial endpoint where attackers can land and prevent credential theft, privilege escalations and lateral movement
  • Protect against the Fundamental Nature of Ransomware May 4 2021 9:00 am UTC 57 mins
    David Higgins, EMEA Technical Director at CyberArk
    The Endpoint is more exposed than it ever has been before. As remote working becomes the norm, these devices are now very much outside the perimeter of the office defences. Unfortunately, exploiting the current global crisis, we have seen an increased and focused effort in Ransomware attacks.

    In this session, we review some past approaches to stopping ransomware and the challenges associated with them. Then look at a more holistic approach to securing the endpoint; enforcing security best practices such as Least Privilege and Application Control, and how this can actually protect against the fundamental nature of Ransomware
  • It’s Human to make mistakes – and attackers are banking on it Apr 21 2021 8:00 am UTC 29 mins
    Gary Pollock
    Falling victim to a Social Engineering Attack, Accidental Damage caused by excessive permissions and Misconfiguration are all elements of Human Error that Attackers will exploit – and persistently have done so to date.

    In this session we review what approaches could be taken to prevent such mistakes but also, and perhaps more importantly, limit their impact. The last point being – should we assume it is human to make mistakes, and so they will continue to happen – therefore our strategy should initially focus on reducing the impact of such incidents? We therefore will discuss isolating attacks from the initial point of intrusion, controlling user privileges and some methods for reducing and identifying misconfiguration.
  • The Future of Access Management Apr 15 2021 9:00 am UTC
    Stas Neyman, Director of Product Marketing at CyberArk Khizar Sultan, Sr. Director of Access Solution Strategy at CyberArk
    Title: The Future of Access Management
    Synopsis
    Access Management (AM) is an essential component of cybersecurity and a central pillar of the enterprise technology portfolio. Security leaders, including CIOs and CISOs, deploy Access Management solutions as part of their Zero Trust and defense-in-depth security strategies to defend IT systems against cyberattacks, identity-focused security breaches and data loss. At the same time, business leaders leverage AM technologies to enhance productivity, improve operational efficiency, and enable business initiatives dependent on reliable identity-based access control mechanisms.

    As IT environments evolve, business drivers change and cybercriminals increasingly target identities, Access Management capabilities must advance to address the new challenges and threats. In this webinar, we will help Security and Identity pros understand emerging trends in the Access Management space, demonstrate how AM can secure hybrid IT environments, and preview the next generation of CyberArk’s AM capabilities.
    After attending the webinar, you will be able to:
    • Understand how changes in IT environments and business drivers are shaping Access Management space
    • Determine which security-focused capabilities are becoming increasingly important
    • Evaluate CyberArk Identity against legacy and modern IAM solutions
    • Gain insight into the next generation of CyberArk’s Access Management capabilities
  • First steps to regain control on a compromised infrastructure Apr 13 2021 9:00 am UTC 47 mins
    Aaron Fletcher, Senior Security Consultant for CyberArk
    Incidents put stress and pressure on the organisation to rapidly respond, reactively and tactically. So the question is, what do you do when this happens? And what could you do to help mitigate the frequency of incidents?

    In this Webinar we will look at a scenario where an organisation comes under attack from a malicious external actor, we will analyse the vector of the attack and we will identify where mitigations can be put in place to reactively respond and where you could proactively defend the organisation.

    - Identifying the type of attack and what did it do?
    - What is the recovery mechanism in place?
    - Measuring the decisions to return to Business as Usual operations
    - Threat Analytics and Discovery for known attacks and Vulnerabilities
  • Take Remote Access Enablement to the Next Level Recorded: Apr 1 2021 43 mins
    Chris Maroun and Andrew Siberman
    Take remote access enablement to the next level with all new features.
    Discover how your organization can securely:

    Enable users to connect to critical systems without a VPN
    Permit direct access to target systems
    Automate session audit, monitoring and isolation
    Provide admins an easy way to approve privileged access direct from their mobile phone
  • Legacy versus Adaptive SSO Recorded: Jan 28 2021 36 mins
    Stas Newman, Director, Product Marketing
    In 2018, 29% of data breaches involved the use of stolen credentials. How can organizations combat this? Using access management solutions, including single sign-on (SSO). SSO has become the de facto standard for managing employee access to applications and systems. Although it offers many security and cost benefits, SSO also introduces a lucrative route to your data – if your SSO credentials are stolen, they can be used to access a broad range of cloud and on-prem systems.
    Adding a contextual layer to your SSO deployment can make all the difference. With historical user behavior context, organizations can detect anomalous behavior that indicates specific attacks or elevated risk of a breach. Traditional SSO deployments, however, require supplemental product integrations for this historical context, which introduces complexity and requires resources to maintain.
    In this webinar, we’ll discuss how adaptive SSO can help you secure your hybrid environment by creating dynamic, context-aware access controls that are based on historical user behavior.
  • It’s Human to make mistakes – and attackers are banking on it Recorded: Jan 21 2021 28 mins
    David Higgins, Technical Director at CyberArk
    Falling victim to a Social Engineering Attack, Accidental Damage caused by excessive permissions and Misconfiguration are all elements of Human Error that Attackers will exploit – and persistently have done so to date.

    In this session we review what approaches could be taken to prevent such mistakes but also, and perhaps more importantly, limit their impact. The last point being – should we assume it is human to make mistakes, and so they will continue to happen – therefore our strategy should initially focus on reducing the impact of such incidents? We therefore will discuss isolating attacks from the initial point of intrusion, controlling user privileges and some methods for reducing and identifying misconfiguration.
  • Top 10 Considerations When Choosing an SSO Solution Recorded: Jan 21 2021 37 mins
    Stas Newman, Director, Product Marketing
    Single Sign-On (SSO) solutions are instrumental for controlling employee access to applications and systems. With SSO, companies leverage a central identity provider to manage user authentication and grant access to resources through a single set of login credentials. This enables companies to improve security through stronger password policies, increase productivity with simplified access to all the resources employees need to do their jobs, and make it easier for IT departments to meet compliance requirements around access.
    With over 20 single sign-on solutions on the market, selecting the right one can be a big challenge. For example, large organizations that leverage Active Directory with multiple domains must consider how well an SSO solution integrates with their existing directory infrastructure. On the other hand, smaller IT teams might need to focus on whether a solution’s self-service capabilities can reduce the volume of help desk requests.
    In this webinar, we will cover ten considerations that will help you to select the best SSO for your organization.
  • Securing Cloud & Automation: Keep Friends Close & Enemies Closer– Session 3 of 3 Recorded: Jan 19 2021 17 mins
    David Higgins, Technical Director at CyberArk
    The complexity of access to systems and data has completely changed the differing levels of security, within the supply chain and Shadow IT being examples of the biggest challenges faced. In this session we will discuss how the global pandemic has accelerated digital transformation, bringing more automation and cloud adoption but how ultimately, despite the changing landscape, the attackers’ methods and route are still the same – identity compromise. We discuss the identities, credentials and secrets used and how to protect them.
  • Securing Remote Infrastructure: Keep Friends Close & Enemies Closer – Session 2 Recorded: Jan 12 2021 21 mins
    David Higgins, Technical Director at CyberArk
    The changes and issues over 2020 have intensified the demands around supply chains and external cloud services provision. In this session we will look into the challenge of the IT Administration and Support teams, who continue to perform their duties but now remotely. This user community also represents one of the most commonly targeted accounts for compromise due to their far-reaching privileged access. We discuss how to ensure secured, trusted and monitored remote, privileged access regardless of where the IT admins are based.
  • Securing Remote Workforce: Keep Friends Close & Enemies Closer – Session 1 of 3 Recorded: Jan 5 2021 23 mins
    David Higgins, Technical Director at CyberArk
    The events of 2020 have highlighted and exacerbated pre-existing challenges for remote workers. The complexity of access to systems and data has dramatically increased due to the explosion of identities in use with staff working remotely from insecure networks. In this session, we will look into the risks associated from the workforce being remote – how attackers look to exploit their identities and compromise the endpoint, which has become more exposed than ever before.
  • Secure Third Party Access with a Modern Identity-Based Approach Recorded: Dec 17 2020 42 mins
    David Higgins, Technical Director at CyberArk
    It’s widely known that perimeter-oriented solutions like VPNs and agent-laden endpoints are ill equipped to help organizations secure remote access to critical internal resources. Therefore, many organizations seek to take an identity-based approach to secure the perimeter and to keep critical internal resources safe. However, providing employees and vendors with smooth access can be an additional challenge. There are unique challenges that come with securing Third Party Vendors and other non-employees that require privileged access from outside a company’s four walls. Additionally, managing third party access can bring a wide range of operational challenges based on popular incumbent solutions.

    In this session, you’ll learn about mitigating risks associated with Third Party Vendors that require privileged access, securing remote access and increasing operational efficiency. You’ll hear about best practices for securing third Parties’ access internal resources, as well as how to make IT and security teams’ jobs easier.
  • Cloud Entitlements Manager Solution Demo Recorded: Dec 15 2020 17 mins
    Tal Kandel, Business Innovation Director at CyberArk
    See key Cloud Entitlements Manager features in action, including the solution’s centralized dashboard display, interactive access map visualizing relationships between identities and resources, exposure level scoring and IAM policy remediation.
  • CyberArk Showcase: Introducing Cloud Entitlements Manager ​ Recorded: Dec 15 2020 32 mins
    Udi Mokady, Chairman and CEO at CyberArk
    Please join our webinar to learn more about LEAST PRIVILEGE ACROSS YOUR CLOUD ENVIRONMENTS.
    The brand-new CyberArk Cloud Entitlements Manager is an AI-powered cloud security service that allows you to detect and remove excessive cloud permissions in a centralized, intuitive dashboard.
    In less than an hour, your organization can deploy the zero-footprint service to remediate risky entitlements across their cloud environments.
  • Managing Third Party Vendor Access? See What’s New with CyberArk Alero Recorded: Dec 14 2020 26 mins
    Chris Maroun, Global SE Director, Emerging Tech at CyberArk
    In today’s landscape with vendors requiring access to a variety of internal systems, including cloud applications, Windows and Linux systems, OT environments, and more, having a robust solution to secure access without straining resources has never been more important. Chris Maroun, Global Director of Solutions Engineering will walk through an in-depth service demo and explain how organizations can leverage Alero to more securely and more efficiently manage remote vendors who require access to critical internal systems.
  • Top Cloud Attack Paths You Should Worry About Recorded: Dec 8 2020 45 mins
    Brandon Traffanstedt, Global Solutions Engineer Director [CyberArk]
    Security pros detail the common ways bad actors attack your cloud environments
    As organizations just like yours transition to cloud environments, so do the cyber criminals. An inherent lack of visibility across cloud environments and workloads is masking security threats, undermining compliance and governance and compromising the value of cloud adoption. Individual cloud vendors, point security solutions and siloed teams address just one piece of the puzzle, increasing the risk of misconfigurations and inhibiting the ability to prioritize the most serious threats.
    It can be overwhelming for security teams when organizations rush headfirst into the cloud without consulting them, putting data and processes at risk.
    To effectively mitigate risk, you need to know what bad actors are after. This webinar will guide you through the main compromise points and attacks paths in the cloud.
    You will understand:
    •How attack paths in the cloud are different from the ones typical for on-premises infrastructure and resources
    •The danger of privileged credentials compromise in the cloud
    •Understand 3 to 4 of the most common Cloud attack paths and potential mitigation tactics and tools
    •The role of cloud identities and permissions in the overall cloud security posture

    Join this webinar and learn how to combat bad actors in the cloud. Bring your questions and concern, we will have a live Q&A session with the CyberArk security pro!
  • The Extended Benefits of Single Sign-On Solutions Recorded: Nov 18 2020 43 mins
    Stas Neyman, Director of Product Marketing
    Today, Single Sign-On (SSO) is a de facto standard for managing employee access to applications and systems. SSO eliminates the need for individual passwords for each application or system account and replaces them with a single set of credentials. The obvious and immediate benefits of Single Sign-On include drastically improved end-user experience, simplified access to corporate resources, and more robust identity security controls.

    However, there are many additional, long-term benefits organizations can realize by implementing SSO solutions that are frequently overlooked during initial discussions. For example, with properly configured self-service tools, companies can significantly reduce their IT costs by reducing the number of password-related help-desk tickets and calls. In addition, SSO can eliminate the risk accounts that remain active when employees change roles or leave companies.

    In this webinar, we’ll discuss the short-term and long-term benefits of modern SSO solutions and highlight the functionality needed to realize these benefits.
  • The Explosion of Identities & Proliferation of Privileged Access Recorded: Nov 9 2020 52 mins
    David Higgins, EMEA Technical Director at CyberArk
    In the past six months, organizations had to swiftly change or accelerate priorities to align with business continuity requirements driven by remote work and other digital transformation programs. As we approach a new year, we have greater visibility about the blind spots that were created along the way. There has been an explosion of identities in use, and we know that any user type (human or not) can have elevated privileges at any time. And, increasingly it’s business users that have elevated access that must be secured with minimal friction.

    Join us to learn:
    1) What is driving explosion of IDs how to leverage automation, AI and ML to ensure security keeps pace
    2) How to build a unified security architecture
    3) How to remove silos and share threat intel across tools
  • Best of IMPACT LIVE Series - Breaking the Cloud Using Five Different Methods Recorded: Nov 5 2020 29 mins
    Asaf Hecht, Security Research Team Leader, CyberArk
    Cloud environments exist everywhere. This in turn means that attackers are super motivated in finding ways to penetrate organizations’ cloud infrastructure. In this session, we will present findings from the CyberArk Labs team, demonstrate five attack techniques, and highlight fundamental considerations such as:
    1. How attackers can steal cloud credentials from endpoints, code and cloud VMs
    2. How intruders can compromise cloud users with only a few permissions, but still succeed to escalate their permissions and become full admins
    3. How to target SSO and IAM solutions that many organizations use for integrating their on-prem network to the cloud
CyberArk, leader in Privilege Access Management
CyberArk channel offers you regular insights and latest news on Privilege Access Management from the global undisputed leader in privileged access management.
You'll find here live webinars, on demand webinars and videos!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top 10 Considerations When Choosing an SSO Solution
  • Live at: Jan 21 2021 10:00 am
  • Presented by: Stas Newman, Director, Product Marketing
  • From:
Your email has been sent.
or close