InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

What Comes After SSPR: Reducing Password Friction and Re-Establishing Control in Hybrid Environments

Presented by

John White, VP of Customer Experience, Bravura Security | Hanno Ekdahl, Founder & CEO, Idenhaus Consulting

About this talk

Hybrid IT has pushed traditional SSPR to its limits. Users still get locked out, systems fall out of sync, and identity teams burn time fixing the same issues on repeat. According to the Identity Defined Security Alliance’s 2025 report, hybrid complexity is now the biggest obstacle to securing identities, and inconsistent credential control is a major source of user friction. This session explores what comes next: enterprise-controlled credential management that delivers predictable access for users, reduces operational load for IT, and finally moves password recovery and governance into a modern, scalable model. Attendees will learn: - How Passwords as a Service centralizes creation, rotation, sync, and recovery across Microsoft, SaaS, on-prem, and legacy systems - How modern mass password reset works and why it matters for baseline credential health - Practical steps to reduce password noise and improve user experience immediately - How to standardize governance and maintain reliable access across complex environments
Identity Defined Security Alliance

Identity Defined Security Alliance

9604 subscribers160 talks
Vendor-neutral talks on reducing the risk of identity-related breaches
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.

Related topics