Hi [[ session.user.profile.firstName ]]

Enabling Cloud Migration with Identity-Based Zero Trust (EMEA/APAC)

Zero Trust security goes beyond the traditional perimeter-based security model, and enables companies to migrate assets outside of their on-premise environment without compromising on security. In the final part of this 4-part series, Dr. Chase Cunningham explains the challenges and the importance of Zero Trust security in the cloud and in hybrid environments. Hed Kovetz will explain how to leverage an identity-based Zero Trust approach to protect cloud and hybrid environments holistically, covering both cloud-native assets and migrated apps, enabling secure ‘Lift and Shift’ cloud migration – no code changes required.
Recorded Mar 31 2021 16 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hed Kovetz, Silverfort CEO and Co-Founder; Dr. Chase Cunningham, former Forrester VP and Principal Analyst
Presentation preview: Enabling Cloud Migration with Identity-Based Zero Trust (EMEA/APAC)

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Can You Block Lateral Movement In Real Time? May 11 2021 4:00 pm UTC 46 mins
    Yiftach Keshet, Director of Product Marketing, Silverfort. Gal Sadeh, Sr. Data Scientist, Silverfort
    Did you know that lateral movement attacks leverage compromised credentials to propagate through the network and gain access to target resources?

    In this webinar, we’ll explain these attacks, and the use of compromised credentials in various steps. We will explain the difference between standard and advanced attacks, and explain why security solutions often fail to detect and prevent these attacks. Finally, we will explain how Silverfort’s cutting edge identity platform can detect and block these attacks.

    Topics covered:

    What are the most common lateral movement attacks?
    The identity and security aspects of lateral movement
    Why security products often fail to prevent lateral movement
    How Silverfort’s Unified Identity Protection platform eliminates different types of lateral movement attacks in real time
  • Consolidating Identity Protection for Hybrid Environments on Azure AD Recorded: Apr 14 2021 42 mins
    Hed Kovetz, CEO, Silverfort; Natee Pretikul, PM, Cloud and AI, Microsoft; Adaeze Chukwu, PM, Identity CXP, Microsoft
    Remote work and recent security attacks have heightened the need for unified identity protection. Silverfort now allows you to extend the power and flexibility of Azure AD to any resource and application across hybrid and multi-cloud environments, and unify your identity protection on Azure AD. Join this panel session to learn how you can protect your on-premises apps and upgrade your app authentication to Azure AD without modifying your apps.

    We will discuss this and show how this capability allows you to:

    • Automatically discover and easily migrate applications to Azure AD
    • Seamlessly connect any assets that couldn’t be migrated before into Azure AD including homegrown and legacy applications, IT infrastructure, command-line tools, and more
    • Manage Identity Protection of all your on-prem and multi-cloud environments in a unified manner within Azure AD
    • Gain operational efficiency and protection by applying Azure AD security controls to all resources in your hybrid network
  • Enabling Cloud Migration with Identity-Based Zero Trust (America) Recorded: Mar 31 2021 16 mins
    Hed Kovetz, Silverfort CEO and Co-Founder; Dr. Chase Cunningham, former Forrester VP and Principal Analyst
    Zero Trust security goes beyond the traditional perimeter-based security model, and enables companies to migrate assets outside of their on-premise environment without compromising on security. In the final part of this 4-part series, Dr. Chase Cunningham explains the challenges and the importance of Zero Trust security in the cloud and in hybrid environments. Hed Kovetz will explain how to leverage an identity-based Zero Trust approach to protect cloud and hybrid environments holistically, covering both cloud-native assets and migrated apps, enabling secure ‘Lift and Shift’ cloud migration – no code changes required.
  • Enabling Cloud Migration with Identity-Based Zero Trust (EMEA/APAC) Recorded: Mar 31 2021 16 mins
    Hed Kovetz, Silverfort CEO and Co-Founder; Dr. Chase Cunningham, former Forrester VP and Principal Analyst
    Zero Trust security goes beyond the traditional perimeter-based security model, and enables companies to migrate assets outside of their on-premise environment without compromising on security. In the final part of this 4-part series, Dr. Chase Cunningham explains the challenges and the importance of Zero Trust security in the cloud and in hybrid environments. Hed Kovetz will explain how to leverage an identity-based Zero Trust approach to protect cloud and hybrid environments holistically, covering both cloud-native assets and migrated apps, enabling secure ‘Lift and Shift’ cloud migration – no code changes required.
  • Why Service Accounts Should be Part of Any Zero Trust Initiative (America) Recorded: Mar 10 2021 17 mins
    Hed Kovetz, Silverfort CEO and Co-Founder; Dr. Chase Cunningham, former Forrester VP and Principal Analyst
    Silverfort Presents: Why Service Accounts Should be Part of Any Zero Trust Initiative

    With hundreds or even thousands of unsupervised, highly-privileged service accounts running in any modern organization, and given the difficulties of securing them, they often become a prime target for attackers. In the third of our four-part series, Dr. Chase Cunningham will explain why service accounts, used for machine-to-machine access, must be included in any Zero Trust initiative. Hed Kovetz will explain how Silverfort is automatically discovering, monitoring and securing these sensitive non-human accounts with self-learning Zero Trust policies, without requiring password changes.

    Topics covered in this series:
    • Why Unified IAM Visibility and Control is Key for Zero Trust Security
    • The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security
    • Why Service Accounts and Machine-to-Machine Access Should be Part of Any Zero Trust Initiative
    • Enabling Cloud Migration with Identity-Based Zero Trust

    (Originally recorded Dec 2020)
  • Why Service Accounts Should be Part of Any Zero Trust Initiative (EMEA/APAC) Recorded: Mar 10 2021 18 mins
    Hed Kovetz, Silverfort CEO and Co-Founder; Dr. Chase Cunningham, former Forrester VP and Principal Analyst
    Silverfort Presents: Why Service Accounts Should be Part of Any Zero Trust Initiative

    With hundreds or even thousands of unsupervised, highly-privileged service accounts running in any modern organization, and given the difficulties of securing them, they often become a prime target for attackers. In the third of our four-part series, Dr. Chase Cunningham will explain why service accounts, used for machine-to-machine access, must be included in any Zero Trust initiative. Hed Kovetz will explain how Silverfort is automatically discovering, monitoring and securing these sensitive non-human accounts with self-learning Zero Trust policies, without requiring password changes.

    Topics covered in this series:
    • Why Unified IAM Visibility and Control is Key for Zero Trust Security
    • The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security
    • Why Service Accounts and Machine-to-Machine Access Should be Part of Any Zero Trust Initiative
    • Enabling Cloud Migration with Identity-Based Zero Trust

    (Originally recorded Dec 2020)
  • Risk Analysis and Adaptive Policies in Zero Trust Security (America) Recorded: Feb 24 2021 23 mins
    Hed Kovetz, Silverfort CEO and Co-Founder; Dr. Chase Cunningham, former Forrester VP and Principal Analyst
    Silverfort Presents: The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security

    In order to achieve effective Zero Trust security, you have to continuously analyze risk across all users, devices, systems and environments. In the second part of this four-part series, Dr. Chase Cunningham will explain why it’s important to conduct comprehensive risk analysis across all environments (including both on-prem and cloud), not only at the perimeter but also inside the network. Hed Kovetz will explain how Silverfort addresses this need with its AI-driven risk engine, while leveraging its unique agentless, proxyless architecture to collect more risk data.

    Topics covered in this series:
    •Why Unified IAM Visibility and Control is Key for Zero Trust Security
    •The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security
    •Why Service Accounts and Machine-to-Machine Access Should be Part of Any Zero Trust Initiative
    •Enabling Cloud Migration with Identity-Based Zero Trust

    (Originally recorded Dec 2020)
  • Risk Analysis and Adaptive Policies in Zero Trust Security (EMEA/APAC) Recorded: Feb 24 2021 23 mins
    Hed Kovetz, Silverfort CEO and Co-Founder; Dr. Chase Cunningham, former Forrester VP and Principal Analyst
    Silverfort Presents: The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security

    In order to achieve effective Zero Trust security, you have to continuously analyze risk across all users, devices, systems and environments. In the second part of this four-part series, Dr. Chase Cunningham will explain why it’s important to conduct comprehensive risk analysis across all environments (including both on-prem and cloud), not only at the perimeter but also inside the network. Hed Kovetz will explain how Silverfort addresses this need with its AI-driven risk engine, while leveraging its unique agentless, proxyless architecture to collect more risk data.

    Topics covered in this series:
    •Why Unified IAM Visibility and Control is Key for Zero Trust Security
    •The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security
    •Why Service Accounts and Machine-to-Machine Access Should be Part of Any Zero Trust Initiative
    •Enabling Cloud Migration with Identity-Based Zero Trust

    (Originally recorded Dec 2020)
  • Why Unified IAM Visibility and Control is Key for Zero Trust Security (America) Recorded: Feb 10 2021 15 mins
    Hed Kovetz, Silverfort CEO and Co-Founder; Dr. Chase Cunningham, Forrester VP and Principal Analyst
    Silverfort Presents: Why Identity is a Crucial Component of Zero Trust Security, featuring Forrester

    Successful Zero Trust implementations focus heavily on telemetry and metrics derived from identities. Anything that has an identity must be considered and verified in order to achieve true Zero Trust security — users, services, devices and cloud assets. Monitoring these identities and their behavior enables deeper understanding of what an entity is doing to better identify and prevent malicious or unauthorized access.

    Join Silverfort’s CEO and Co-Founder Hed Kovetz and guest speaker, Forrester’s VP and Principal Analyst Dr. Chase Cunningham for a discussion on the different aspects and the growing importance of identity in Zero Trust implementations.

    Topics covered:
    • Why Unified IAM Visibility and Control is Key for Zero Trust Security
    • The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security
    • Why Service Accounts and Machine-to-Machine Access Should be Part of Any Zero Trust Initiative
    • Enabling Cloud Migration with Identity-Based Zero Trust

    (Originally recorded Dec 2020)
  • Why Unified IAM Visibility & Control is Key for Zero Trust Security (EMEA/APAC) Recorded: Feb 10 2021 15 mins
    Hed Kovetz, Silverfort CEO and Co-Founder; Dr. Chase Cunningham, Forrester VP and Principal Analyst
    Silverfort Presents: Why Identity is a Crucial Component of Zero Trust Security, featuring Forrester

    Successful Zero Trust implementations focus heavily on telemetry and metrics derived from identities. Anything that has an identity must be considered and verified in order to achieve true Zero Trust security — users, services, devices and cloud assets. Monitoring these identities and their behavior enables deeper understanding of what an entity is doing to better identify and prevent malicious or unauthorized access.

    Join Silverfort’s CEO and Co-Founder Hed Kovetz and guest speaker, Forrester’s VP and Principal Analyst Dr. Chase Cunningham for a discussion on the different aspects and the growing importance of identity in Zero Trust implementations.

    Topics covered:
    • Why Unified IAM Visibility and Control is Key for Zero Trust Security
    • The Importance of Risk Analysis and Adaptive Policies in Zero Trust Security
    • Why Service Accounts and Machine-to-Machine Access Should be Part of Any Zero Trust Initiative
    • Enabling Cloud Migration with Identity-Based Zero Trust

    (Originally recorded Dec 2020)
  • Four Simple Steps to Secure Your Service Accounts [30 minutes] Recorded: Oct 27 2020 38 mins
    Hed Kovetz, CEO and Co-Founder, Silverfort and Revital Aronis, Product Manager, Silverfort
    With hundreds or even thousands of unsupervised, highly-privileged service accounts running in modern organizations, they can become high-risk assets. Join us for a discussion about four simple steps you can take to secure these accounts and reduce the risk of a cyber attack.
  • Extending YubiKey FIDO2 Hardware Token to Systems and Interfaces with Silverfort Recorded: Sep 22 2020 40 mins
    Jonathan Nativ, Silverfort, and David Treece, Yubico
    Now more than ever, organizations need a holistic authentication solution to maximize security without disrupting productivity. An efficient way to do so is to strengthen weak static username/password credentials with strong FIDO2 hardware-backed public/private-key credentials.

    In this session with Silverfort and Yubico experts, we’ll review the integrated solutions, discuss key customer use cases and explain how you can now:
    o Extend FIDO2 hardware-backed Multi-Factor Authentication to any system or interface
    o Enforce strong authentication without implementing software agents, changing application code, or using proxies
    o Take advantage of the integrated solutions to address various use cases
  • Silverfort 101: Introduction to Silverfort's Agentless Authentication Platform Recorded: Aug 25 2020 37 mins
    Hed Kovetz, CEO and Co-Founder, Silverfort
    Have questions about Silverfort’s agentless architecture? Want to know how it’s AI-Driven risk engine works? Wondering about the different use cases? - This webinar is for you!
    Join us for an overview of Silverfort’s Agentless Authentication Platform.
    In this session, Hed Kovetz, Silverfort’s CEO and Co-Founder reviews:
    • Silverfort’s innovative and non-intrusive architecture
    • Silverfort’s AI-Driven risk engine and adaptive policies
    • Key customer use cases
    *********** The session includes a live demo **********************
  • Blocking Identity-Based Threats with Silverfort +Palo Alto Networks Cortex XSOAR Recorded: Jul 23 2020 47 mins
    Hed Kovetz, Ron Rasin and Pramukh Arkalgud Ganeshamurthy
    Automate your security operations and response to identity-based threats and behavior anomalies with Silverfort playbooks.

    Learn how to:
    • Automate threat enrichment with Silverfort’s continuous AI-driven risk data
    • Automate step-up authentication with agentless multi-factor authentication
    • Automate response to malicious user activities
    • Automate service account security
    • Automate the enforcement of dynamic zero-trust policies
  • Video: Silverfort & Yubikey Recorded: Jul 2 2020
    Silverfort
    Extending Yubikey Secure Authentication To Shared Folders
  • Can You Detect and Block the Evasive Threat of Lateral Movement? Recorded: Jun 16 2020 66 mins
    Rich Peckham, Sr. Solution Architect, Silverfort, and Mike Carroll, Sr. Sales Engineer, Silverfort
    After the initial breach, hackers need to progressively move through a network, in their search for target data and assets. Lateral movement is a term that refers to techniques they use.
    Join us for a talk about the use of lateral movement techniques in various attacks. Rich and Mike will explain what lateral movement is, and show some attack demos. We will discuss the importance of detecting and blocking these attacks early on and demonstrate how it can be done.
  • Cybersecurity & Employee Productivity Can the Two ever Meet? Recorded: Jun 16 2020 50 mins
    Amar Singh, Ron Rasin & Jonathan Hope
    You have to fill in this 5-page form if you want to install this app" said the cybersecurity officer. Sound familiar?

    Cybersecurity is seen as a blocker by the average business user. Whether it's the annoying message about not being allowed to surf a perfectly legitimate website or the essay you have to write to justify your business-critical.

    This is NOT to say that Cybersecurity is in the wrong here.

    Join Ron Rasin, Jonathan Hope and Amar Singh, Global CISO as they discuss how you can maintain the balance between happy business users (not a common term, that) and joyful cybersecurity teams (yes, it is possible to make security people happy).

    Some points of discussion:
    – Technology and configurations to ensure maximum and transparent security
    - Monitoring controls and tactical actions to silently uplift the security posture and more
  • Is Remote Access Putting Your Organization at Risk? Recorded: May 19 2020 61 mins
    Hed Kovetz, CEO and Co-Founder, Silverfort and Gil Kirkpatrick, Chief Architect, Semperis
    Recent events forced us to change the way we work and today most employees are working remotely. While enabling remote access is critical these days, it’s also exposing us to more risk: when hundreds of users are inside the network – who is monitoring and validating that access to our most sensitive assets is legitimate and secure?

    In this webinar, we will discuss why remote access is putting organizations at risk. We will review examples of relevant attacks that target our most critical assets, like Active Directory. Finally, we’ll discuss what should be done to mitigate the threat and protect sensitive assets from breach and compromise.
  • Video: Introduction to Silverfort Recorded: May 11 2020 2 mins
    Silverfort
    A short video introducing Silverfort's Authentication Platform
  • Silverfort platform Integration with Azure Active Directory Recorded: May 11 2020 2 mins
    Hed Kovetz, CEO and Co-Founder, Silverfort
    Silverfort integrates with Azure Active directly to influence conditional access policies in Azure AD in real-time and to deliver unified authentication policies.
    Silverfort also integrates with the Microsoft Security Graph API to share the Silverfort’s continuous AI-driven risk assessment with Microsoft and to can get risk indicators from Microsoft to apply intelligent security policies across the board.
Authentication Evolved: Agentless. Proxyless. Limitless.
Silverfort extends secure authentication and Zero Trust policies across all sensitive assets, on-premises or in the cloud, without agents or proxies. This includes systems and interfaces that couldn't be protected until today like IT infrastructure, homegrown and legacy applications, file shares, databases, IoT devices and more.
In addition, Silverfort extends protection to interfaces and access tools that currently allow attackers to bypass all other MFA solutions (Remote PowerShell, PsExec, etc.)

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Enabling Cloud Migration with Identity-Based Zero Trust (EMEA/APAC)
  • Live at: Mar 31 2021 9:00 am
  • Presented by: Hed Kovetz, Silverfort CEO and Co-Founder; Dr. Chase Cunningham, former Forrester VP and Principal Analyst
  • From:
Your email has been sent.
or close