Back to Congress
Latest Sponsored Events
Related Videos
Webinar Recording
Oct 27, 2023
Passwordless Authentication: What, Why, and How

Join identity and access management experts from KuppingerCole Analysts and ForgeRock for a discussion on passwordless authentication solutions, the reasons organizations are slow to implement them, and how to go about making the switch successfully by understanding the technologies and process changes involved.

Alejandro Leal, Research Analyst at KuppingerCole will explain the main features, capabilities, and benefits of passwordless authentication. He will also look at how to assess passwordless authentication solutions, and how to identify the ones that are best suited to your organization.

Jeff Carpenter, Director of Product Marketing at ForgeRock will discuss the various use cases for passwordless authentication and the need for different approaches. He will also look at some common challenges and potential pitfalls, as well as the best practices to follow, as well as provide an overview of how the ForgeRock Identity Platform enables passwordless deployment.

Webinar Recording
Dec 10, 2021
Mitigate Risks, Cut Cost, and Achieve Compliance With AI-Driven IGA

Effective Identity Governance and Administration (IGA) is becoming increasingly important as digital transformation, cloud computing, and remote working increase the scope and complexity of Identity and Access Management (IAM) to new levels. But legacy role-based access control (RBAC) solutions alone are unable to meet the changing and dynamic IGA requirements of modern enterprises.

Event Recording
May 27, 2021
Tim Bedard: Mitigating Risks and Reducing Costs with IAM Hyperautomation
Event Recording
Mar 04, 2021
Martin Kuppinger: Interview with Simon Moffatt
Event Recording
Mar 04, 2021
Simon Moffatt: The Road to CIAM Success: Why an Identity Fabric Powers Digital Transformation

Many organizations are undergoing new modes of operation, which is enabling them to develop a "digital instinct" for their customer's needs.  A correctly designed consumer identity management platform allows those organizations to excel, in an agile, secure, and business-enabling way.  What does success look like in the CIAM world and how do identity fabrics enable it?

Webinar Recording
Nov 25, 2020
Zugriffsmanagement mit künstlicher Intelligenz neu erfinden

Unternehmen müssen in der modernen IT-Welt eine Vielzahl von Angestelltenidentitäten, Benutzerrollen, Zugangspunkten und Endgeräten verwalten. Diese Verwaltung von digitalen Identitäten und den entsprechenden Zugriffsrechten ist für die meisten Firmen nicht nur kompliziert, sondern auch zeitaufwändig. Wenn Unbefugte fälschlicherweise Zugriff zu sensiblen Unternehmens- und Kundendaten erhalten, kann dies zu Compliance-Problemen, Bußgeldern und Reputationsverlusten führen.

Event Recording
Nov 12, 2020
Matt Berzinski: Choosing the Right IAM solution to secure your Hybrid Cloud Environment

In 2020 organizations have been forced to accelerate their digital transformation plans to meet the needs of a more digital engaged end user. From remote workforces to shifts to online commerce, nearly every industry has had to adopt to this new reality. This has resulted in rapid cloud service adoption and a need for integration of existing on-premises investments with them. But today's Hybrid Cloud reality needs a comprehensive security policy that encompasses newly acquired cloud technologies all the way down to legacy on premises applications which provide business critical capabilities. In this presentation, we will discuss the characteristics needed in an Identity and Access Management platform that will allow organizations to quickly get address new security issues while allowing for a smooth digital transformation at their own pace.

Event Recording
Nov 12, 2020
Panel - Accelerating Digital Transformation with Secure Cloud Access
Webinar Recording
Nov 08, 2019
Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?

Application and infrastructure architectures are continuously changing in order to mirror the demands and challenges of organizational needs. A common problem with legacy systems is the inability to understand and adapt to the new business models in an ever-changing world.

Webinar Recording
Jan 16, 2019
Solving New Authentication Challenges While Finding Parity Between User Experience and Security

In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops to prove who they are.

Webinar Recording
Sep 26, 2018
Digital Identities in the Internet of Things - Securely Manage Devices at Scale

The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services are being, or will be, digitized. Top drivers of this digitization are eroding margins and changing customer behaviour, whereas new market disruptors face security challenges. The question now becomes: where do companies decide to focus their money and efforts, in order to capitalize on this disruption?
Either on business optimization, by doing things better and more efficiently, or focusing on a business transformation, to move from CAPEX to OPEX.

Webinar Recording
Dec 06, 2017
Authentication & Authorization for the Microservices World

Microservices architectures, where applications comprise multiple loosely coupled components, which can be developed using different languages frameworks, and platforms, have become one of the most popular alternatives to traditional monolithic enterprise applications. Since these modules are deployed independently and only communicate over standard protocols or APIs, they lend themselves to continuous delivery and continuous integration processes, reducing costs and risks of developing new features. However, with an increasing number of microservices, the complexity of adding security and identity capabilities to each of them can quickly get out of hand. By externalizing and centralizing identity and access management, organizations can ensure a secure and consistent identity and access management across on-premises and cloud infrastructures, as well as promote DevOps best practices.