Back to Webinar
Latest Sponsored Events
Related Videos
Webinar Recording
Mar 10, 2023
Re-Imagining Identity Management for the Digital Era

Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those challenges are likely to evolve, and what could be done to meet current and future needs.

Participate in the debate between Martin Kuppinger, Principal Analyst at KuppingerCole Analysts and Gautam Singh Deo, Director - Strategic Business Engagements at ARCON as they discuss how to move beyond siloed approaches to ensure a security outcomes approach that is focused on identity.

Put your questions forward as our experts consider how best to achieve an identity-centric strategy that combines the best of Zero Trust, IAM, IGA and PAM, and as they explore the benefits of a converged identity security approach using Contextual Data Models.

Webinar Recording
Dec 07, 2022
Unify Identity and Security to Block Identity-Based Cyber Attacks

Join security and identity experts from KuppingerCole Analysts and ARCON as they discuss the importance of securing enterprise credentials, explain why a unified identity security approach in line with Zero Trust principles improve security and efficiency, and describe how to combine solutions to address key identity security issues.

John Tolbert, Director Cybersecurity Research at KuppingerCole will cover the background on identity involved data breaches and discuss the need for identity threat detection. He will also describe where identity fits in the MITRE ATT&CK matrix, and how Zero Trust architecture can reduce the threat of attacks involving identity aspects.Gautam Singh Deo, Director Strategic Business Engagements at ARCON will give examples of identity-based attacks, discuss the evolution of the identity landscape, explain the importance of identity-centric security in the context of a Zero Trust, and provide an overview of identity threat detection and response solutions and building a contextual data model.

Webinar Recording
Jul 29, 2022
Security and Compliance Benefits of Endpoint Privilege Management

As IT applications and endpoints proliferate, and enterprises shift to hybrid IT and hybrid working models, managing end user privileges is becoming very challenging, resulting in breaches, fraud, and undetected risky behavior. Enterprises need a way of governing end users wherever they are working and protecting a growing number of endpoints. Join experts from KuppingerCole Analysts and ARCON as they discuss the security implications of hybrid IT and hybrid working, and how these risks can be mitigated. They will also explore the extent to which Endpoint Privilege Management (EPM) solutions provide the capabilities required to manage privilege-related risk and improve IT security.

Paul Fischer, Lead Analysts at KuppingerCole Analysts will explain how modern compliance and security requirements demand that EPM should offer data governance capabilities and analysis in addition to traditional capabilities such as whitelisting and blocking file execution. Anil Bhandari of ARCON will explain the role of ARCON Endpoint Privilege Management in reinforcing endpoint security and how it uses User Behavior Analysis and Data Leakage Prevention features, including Data Intellect, to build a contextual security layer.

Webinar Recording
Jul 13, 2022
Multi-Cloud Identity Governance 101

In an effort to cut costs, improve efficiencies, and cater for a mobile and remote workforce, businesses are adopting cloud services from multiple providers. This has created a host of challenges in managing identity and access across multiple clouds, and has introduced several risks that need to be addressed urgently. Join experts from KuppingerCole Analysts and ARCON as they discuss the security implications and the need for processes and controls to ensure that Identity and access are managed effectively and easily across a multi-cloud environment. They will also consider how a unified management strategy can dramatically reduce cybersecurity vulnerability in a multi-cloud environment.

Paul Fisher, Lead Analyst at KuppingerCole Analysts, will look at how the identity and entitlement management of multi-cloud environments is changing radically. He will also explain what security managers can do to keep on top of this change. Mr. Anil Bhandari, Chief Mentor at ARCON will discuss the challenges in administering and governing multiple user IDs in an ever-expanding multi-cloud world in the current context, and explain how ARCON’s Cloud Governance platform can help to overcome those challenges. 

Webinar Recording
Nov 04, 2020
Decoding Advanced Privileged Access Management for Digital Environments - A conversation with Paul Fisher and Anil Bhandari

Did you know that privileged accounts are a major source of data leaks? These powerful administrative accounts provide access to business-critical information stored in applications and servers. A single instance of privileged password abuse can bring down the entire IT infrastructure. Therefore, enterprises are rethinking the access control mechanism to harden authentication.

Webinar Recording
Sep 03, 2020
Remote Workforce: How to Protect Yourself From Emerging Threats?

The outbreak of the COVID-19 pandemic has served as a catalyst for digitization in many companies and led to an increase in remote work and adoption of the bring your own device (BYOD) policy. Every device and digital service that employees use is a potential gateway into company networks and thus poses a security risk. The risks are magnified even more when privileged accounts enter the equation because they enable access to critical data. Given the immediacy and speed with which companies had to shift from office to remote work, security concerns were often neglected leading to an increase in successful cyberattacks.

Facing this situation of increased risks and attack vectors, companies need to have foolproof security in place to keep their data safe and secure. IT teams should start with the very basics such as giving the company staff cybersecurity awareness trainings and monitoring remote access. While it has become a well-known fact that Privileged Access Management (PAM)  is an integral part of cybersecurity in modern companies, Secure Compliance Management (SCM) and User Behaviour Analytics (UBA) perhaps have not been given proper attention in the security world yet. 

Webinar Recording
Jul 03, 2019
Challenges for Managed Service Providers Offering Privileged Account Management as a Service

Insufficiently protected privileged accounts pose high risks to any given company today. Therefore, Privileged Account Management (PAM) is of paramount importance to a functional insider threat program, which is at the core of any modern cybersecurity strategy. While utilizing a variety of IaaS, PaaS and SaaS offerings, organizations often face difficulties in controlling the management of their privileged accounts due to a lack of time, budget and other resources.