Zero Trust Azure Application Migration 101: Onboard Applications like a Pro!
Watch the Previously Recorded Webinar
Join our experts as they delve into the topic of Zero Trust and how it can be applied to Azure Application Migration. They will discuss the benefits of implementing a Zero Trust strategy and the key considerations and best practices for successful onboarding of applications in Azure. During the webinar, you will learn: The basics of Zero Trust and how it applies to Azure Application Migration, Best practices for implementing a Zero Trust strategy for onboarding applications, Key considerations for successful onboarding of applications in Azure.
See Webinar RecordingAzure Identity Management
Watch the previously recorded Webinar
Learn about the emerging importance of Azure Active Directory as more than a directory and why it is important to connect all your applications to a single Cloud identity service.
Azure RBAC Management
Watch the Previously Recorded Webinar
The elastic nature of the Azure infrastructure and the ability to allow rapid changes such as self-provisioning and de-provisioning of new services and IT resources make it difficult for security and audit teams to meet their regulatory obligations concerning asset management. Take control of your Azure RBAC security. Optimize your Azure security landscape and ensure compliance with your corporate risk policies.
See Webinar RecordingAzure License Management
Watch the previously recorded Webinar
This webinar highlights the five most common challenges of managing Azure/O365 licenses and discusses solutions for each that allow organizations to generate significant cost and time savings.
Extending Active Directory to Office 365
Watch the Previously Recorded Webinar
This webinar highlights potential pitfalls with Identity and Access Management of Office 365 and discusses best practice solutions for each.
See Webinar RecordingUpgrade your SSO by combining RBAC/ABAC into the experience
We address the following issues
- Today’s SSO solutions have missed the mark
- Active Directory Group restrictions aren’t enough
- RBAC/ABAC - What it means for your environment
- What the future of SSO looks like
- What the future of SSO looks like
- Intelligent access control of your SAML and WS-Federation applications
Watch CEO Patrick Parker’s Keynote at the European Identity & Cloud Conference 2017
Identity is Not the New Perimeter: Slaying IAM’s Sacred Cows
Identity as the New Perimeter is a sleek and sexy term that seems to perfectly encompass the modern world in which we live dominated by talk of IoT, Cloud, BYOD, Big Data, AI, CIAM, and other buzzworthy acronyms. Unfortunately, it and other equally unquestioned and under-analyzed IAM mantras do more harm than good by oversimplifying and distracting IAM practitioners from the reality of the security threats facing our organizations today.
In this session, we will question a number of outdated and inaccurate commonly held IAM beliefs and replace them with actionable and impactful techniques such as Micro-Segmentation, Zone-Based Security, Defense in Depth, Least Privilege and others. We will also highlight the central role of IAM in delivering on these strategies.
See Webinar RecordingWatch CEO Patrick Parker’s Keynote at the European Identity & Cloud Conference 2016
Reimagining Identity and Access Management Processes with Algorithms
We are on the brink of a machine learning revolution in which computers won't just speed up existing security processes but enable the automation of processes and decisions too complex for the human mind to imagine.
See Webinar RecordingWatch CEO Patrick Parker’s Keynote at the European Identity & Cloud Conference 2015
Getting a Grip on Both Microsoft Azure and Amazon AWS
As organizations race to transplant onsite infrastructure and applications to the Cloud, strong yet flexible control over authorization will play a critical role...
See Webinar RecordingWatch CEO Patrick Parker’s Keynote at the European Identity & Cloud Conference 2014
IAM Meat and Potatoes Best Practices
Identity and Access Management projects can be the most complex and riskiest that an organization will undertake. In this conference keynote, CEO Patrick Parker addresses the most common pitfalls and offers best practices to avoid them and ensure project success.
See Webinar Recording