Back to Webinar
Latest Sponsored Events
Related Videos
Webinar Recording
Jan 20, 2023
Championing Privileged Access Management With Zero Trust Security

A modern approach to securing privileged accounts is to apply the principle of Zero Trust: Never trust, always verify. While Zero Trust is not an off-the-shelf solution, it is modern vendors of PAM solutions that recommend using this security principle to cement the technical capabilities of their products. This webinar will provide actionable insights for organizations to employ Zero Trust security in their overall PAM strategy and operations.

Paul Fisher, Senior Analyst at KuppingerCole, will look at the origins of Zero Trust theory and its development as well as how Zero Trust fits into the KuppingerCole identity and cybersecurity fabric architecture concepts. He will address how Zero Trust can assist in managing cloud entitlements and discuss we 100% Zero Trust is possible. Srilekha Sankaran, product consultant for PAM solutions at ManageEngine, will address the risks of insider threats and privilege misuse in the era of hybrid work, and discuss the management and elimination of the risks posed by standing privileges.

Webinar Recording
Aug 06, 2020
Four Key Components Critical to the Future of Privileged Access Management

Privileged Access Management (PAM) has assumed a critical role in protecting the most valuable data and services within organizations from theft, loss, and unauthorized access. But as companies and other organizations have become more complex and embrace digital transformation, PAM is also taking on a core operational function to achieve better insight into data usage and contribute to agile working processes.

Webinar Recording
Jul 10, 2020
Working From Home Is Not Secure Without an Effective IAM

The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many challenges, for workers, for their managers, for the IT teams. One of the biggest challenges is finding the right balance between enabling WfH and security.

Webinar Recording
May 02, 2019
Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration

IAM and therein IGA (Identity Governance & Administration) focuses on managing identities and their access across a variety of systems. That is essential, particularly for heterogeneous environments. However, there are two aspects that aren’t well-addressed by many of today’s IGA products:

  • In-depth management of Active Directory, Azure AD, Office 365 and other core infrastructure elements, from creating mailboxes to in-depth access control in AD and on file servers
  • Lightweight implementations for SMBs that don’t need the full breadth in capabilities

Where these requirements aren’t served well by existing IGA implementations or where these are just too complex for the customer’s IT infrastructure, targeted tools that work around Microsoft Active Directory (AD) and, nowadays, Azure AD, come into play – with the depth, adding to the breadth of IGA, or as standalone solutions for customers that don’t have and need a full IGA solution. In this webinar, we look at how a complete IAM infrastructure looks like and which capabilities are best provided by which tools for different scenarios.

Webinar Recording
Dec 13, 2017
Step-by-Step Guide to GDPR Compliance

Many people still have only a vague idea how to start planning for the GDPR, even after reading numerous publications and discussions and being bombarded from all directions with promises to solve all compliance challenges once and for all. This is completely understandable, since the regulation with its 11 chapters and 99 articles is very difficult to comprehend, to say nothing about translating the mixture of technical and legalese terms into concrete actions. The goal of this webinar is to help people decrypt the bureaucratic language of the regulation, to clarify each of its major requirements, such as managing user consent, appointing a data protection officer and reporting data breaches, and outline an actionable plan that your company needs to adopt to comply with them. Last but not least, we are going to explain how to select the right security solutions that will help you achieve compliance and how avoid false promises of “GDPR-compliant software”.