Back to Webinar
Latest Sponsored Events
Related Videos
Webinar Recording
Aug 25, 2021
Trust No One: Zero Trust Strategy and Design

With workloads moving to the cloud and remote working increasing, traditional perimeter-based security strategies are no longer practical. A Zero Trust model of strict access control for every user or device offers an alternative that secures data while ensuring it is accessible to those who need it. But the shift to treating both internal and external users as untrusted can be challenging.

Webinar Recording
Sep 15, 2020
The Fast Track to Optimized Operations With IAM-as-a-Service

IAM-as-a-Service provides the operational agility by bringing-in skills and expertise to implement a precise strategy, technology deployment, process automation, service delivery and support model, thus, gaining operational efficiency and streamlining budgets. Therefore, IAM-as-a-Service, with its pre-built integrations, is the ideal solution for short-staffed IAM teams.

Join this webinar and learn

  •     Why IAM projects often stall
  •     How you implement initiatives faster with IAM-as-a-Service
  •     How you can make use of automation to take the burden off your IAM teams
  •     To optimize IAM budgets by outsourcing repetitive, low-value tasks with IAM managed service

Matthias Reinwarth, Lead Advisor at KuppingerCole, will explain why IAM projects typically stall when companies don’t have the necessary human or financial resources or expertise and why this hampers the overall digital transformation of a company.

He will be joined by Swapnil Mehta, General Manager, Identity, Access, and Privacy at Persistent Systems, who will address IAM requirements with new digital transformation efforts, process automation with IAM deployments, cost optimization with 24x7 hosted IAM service

Webinar Recording
Aug 26, 2020
The 3 Steps to Secure IAM Modernization

When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges on the way from legacy IAM to a modern IAM infrastructure are manifold and should be considered beforehand.