Back to Webinar
Latest Sponsored Events
Related Videos
Webinar Recording
Feb 23, 2024
The Rise of Identity as a Service (IDaaS) as the Cornerstone of Modern Cybersecurity

While organizations can tackle these challenges separately, they can save resources by opting for an Identity-as-a-Service (IDaaS) solution, which gives them everything they need for robust identity management and authentication processes in one solution. Join us as we dive into the nuanced problems IDaaS aims to solve, ensuring a secure and streamlined approach to identity management across a myriad of applications and platforms. With a focus on both security and user experience, IDaaS emerges as a compelling answer to the evolving challenges faced by organizations in safeguarding their digital ecosystems.

Join this webinar to learn about:

  • The latest in cybersecurity with IDaaS, incorporating advanced measures like multi-factor authentication.
  • Securing remote workforces efficiently through actionable tips, ensuring streamlined access via singe sign-on for improved user experiences.
  • Navigating data protection standards effortlessly, meeting regulatory requirements, and implementing governance tools for audit trails and compliance reporting.
  • Evaluating the merits of hybrid and dedicated IDaaS solutions, gaining key insights for successful implementation in your organization`s cybersecurity strategy.

Paul Fisher, Senior Analyst at KuppingerCole Analysts, dissects the concept of IDaaS and the problems it claims to solve. Specifically, he discusses whether the adoption of Identity as a Service (IDaaS) offers organizations a flexible and scalable security solution that not only strengthens security, but also improves operational efficiency and overall user experience.

He is joined by Stuart Sharp, VP Product Strategy at One Identity, who shares practical tips and key considerations for a successful IDaaS implementation. Together with the audience, he dives into the nuanced problems IDaaS aims to solve, ensuring a secure and streamlined approach to identity management across a myriad of applications and platforms. He also explores if a hybrid approach is a viable alternative, and in what scenarios IDaaS emerges as the superior choice.

Webinar Recording
Jan 31, 2024
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity and Why You Need a Strong IAM Posture

Join us for a compelling webinar on "Mastering Identity Security in the Age of Evolving Attack Surfaces." This session will address how to minimize human error, eliminate gaps, and overlaps within your different IAM tools, and align your security strategy with the constantly evolving challenges of today and tomorrow's cyber threats.

Larry Chinski Vice President of Global IAM Strategy at One Identity, and Martin Kuppinger, Principal Analyst at KuppingerCole, will guide you on aligning your security strategy with the ever-changing challenges posed by today's and tomorrow's cyber threats. Don't miss this opportunity to enhance your IAM posture and safeguard your enterprise from evolving risks.

Webinar Recording
Jun 30, 2022
Dealing Effectively with Modern, Industrialized Cyber Threats

The cyber threat landscape has become very complex, with state-of-the-art intrusion, ransomware, and cryptocurrency mining tools now readily available through online stores and service providers, and an expanding attack surface due to increased cloud computing and remote working. Keeping data secure while ensuring its availability to legitimate users has become extremely challenging. Join experts from KuppingerCole Analysts and One Identity as they discuss the evolution of the cyber threat landscape and consider how correlating visibility, security, and control to an identity and its associated processes and accounts can significantly mitigate against modern cyber threats. 

The cybersecurity threat landscape continues to evolve and pose new challenges to CISOs and security managers. But as Paul Fisher, Lead Analyst at KuppingerCole will explain, it isn’t just about responding to threats, but also managing identity access and cloud infrastructures in new ways. Alan Radford, Global Identity and Access Management Strategist at One Identity will explain how to achieve a consistent view across users, machine identities, and accounts to help organizations move to a unified state. He will also highlight the importance of managing privileged users, and provide an overview of Unified Identity Management Platform that integrates Access Management, PAM, and IGA solutions.

Webinar Recording
Jun 16, 2021
Privileged Access Management: Cloud Delivery Without Compromise

Privileged Access Management (PAM) solutions are critical cybersecurity and risk management tools for just about every business to address the security risks associated with privileged users and privileged access, but not everyone can afford expensive on-prem deployments.

Event Recording
May 12, 2021
Robert Byrne: IGA in the Cloud without Compromise

Attend this session to learn how One Identity’s cloud-first solutions portfolio enables organizations to let business needs, not IT capabilities; drive how they implement their Identity Governance and Administration strategy. There is no single right way to do cloud-based Identity and Access Management services. Not only is every organization at a different place in their journey, and each will prioritize cloud benefits differently. So, no matter where you are on your cloud journey, modular and integrated solutions can strengthen your identity security, help you achieve governance and a Zero Trust model, and get compliant. Join this session, led by One Identity Field Strategist Rob Byrne. He’s worked with clients from many different industries with a wide array of Identity Security challenges and helped them successfully implement a secure and efficient IGA program.

Event Recording
May 12, 2021
Interview with Robert Byrne
Event Recording
Nov 20, 2020
Zoltan Bakos: Integration des Privileged Access Management in wichtige Geschäftsprozesse und -vorgänge, um Just-in-Time-Privilegien durchzuführen und Zero Trust zu ermöglichen.

Privilege Access Management (PAM) sollte ein Schlüsselelement in Ihrer Sicherheitsstrategie sein. Daher müssen Sie sicherstellen, dass sich die von Ihnen gewählte Lösung leicht in Ihre Geschäftsprozesse und -vorgänge integrieren lässt. Erstens muss die Lösung schnell in Ihrer Umgebung implementiert werden können und möglichst wenig Reibung im täglichen Geschäftsbetrieb verursachen. Darüber hinaus muss sie sich nahtlos in andere Geschäftsvorgänge wie IGA, DevOps, Robotische Prozessautomatisierung und Active Directory integrieren, um Just-in-Time-Privilegien zu bieten, die Zero Trust ermöglichen. Außerdem muss die Verhaltensanalyse genutzt werden, um Risiken in Echtzeit zu beheben. Bevor Sie weitere Schritte mit Ihrem aktuellen PAM-Projekt unternehmen, nehmen Sie an dieser Sitzung teil, um zu sehen, wie das PAM-Portfolio der nächsten Generation von One Identity den Schutz, die Sichtbarkeit und den Umfang bietet, den Sie benötigen, um die schnellste Wertschöpfung und die niedrigsten Gesamtbetriebskosten zu erzielen. 

Webinar Recording
Sep 10, 2020
Identity and Access Management Strategies That Grow With Your Business

For these organizations, an adaptable Active Directory-centered (AD) approach can address the areas of highest impact. By adding cloud-based access request and access certification functionality to the mix, a company can achieve a basic IGA solution for a fraction of the cost, complexity, and deployment time. This approach also provides the opportunity to expand the scope beyond AD and Azure AD by embracing many non-Windows systems (such as Unix/Linux) and SaaS applications (via SCIM connectivity). Learn how to build a strategy for a modular approach to identity that can be custom fit to company needs, size, complexity, and budget.

This webinar will equip you to:

  • Provision your AD and Azure environment – and beyond
  • Approach baseline IAM implementation efficiently
  • Plan a short track for improving security and compliance
  • Set up your identity program for ongoing success
  • Be well-positioned to expand to IGA and PAM when the time is right.

In the first part, KuppingerCole Principal Analyst Martin Kuppinger will give a brief overview of identity in general as well as of IAM, IGA and PAM strategies, and will look at what every business, regardless of size and industry, needs in IAM.

He will be joined by One Identity Field Strategist Dan Conrad, who will explain how to prioritize IGA capabilities for maximum impact and show why you should opt for a modular approach with AD-optimized tools.

Webinar Recording
Jun 18, 2020
Gain a Unified Business View With Enterprise Identity Management

Identity Governance and Administration (IGA) is continuing to evolve through more integrated Identity and Access Governance solutions. IGA products are often required to give deep integrations with other enterprise products and applications to deliver the expected business value, as well as a need for having one interface for IGA across the range of applications and services.

Webinar Recording
Feb 23, 2018
How to Make Your IAM Program a Success

The best way to ensure the success of your company’s IAM program is to follow in the footsteps of organizations whose programs have proven successful, learn from their leading IAM experts and avoid common mistakes.
KuppingerCole has compiled a list of recommendations and best practices based on a series of interviews with enterprise security architects, IAM leads, CISOs and other executives from a number of large enterprise organizations in different industries across the globe.

Webinar Recording
May 24, 2017
Getting Identity and Access Management Right – Even If SAP Is Involved

Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the target system or application. IT departments are struggling to make this access frictionless for users yet maintain compliance with corporate and government-imposed security and privacy regulations. This task is even more complicated if business-critical platforms like SAP are involved – not only SAP has its own security and access governance requirements, it is usually managed by a completely separate team from the one responsible for enterprise-wide IAM program.

Webinar Recording
Dec 09, 2016
The Future of Privilege Management – Understanding the Bigger Picture

Privilege Management, the management of accounts with elevated privileges and, in particular, shared accounts, is changing drastically. Providing shared account password management, a privileged Single Sign-On, or restrictions for elevated privileges is no longer sufficient.

Privilege Management is getting broader, both horizontally and vertically. Horizontally by covering not only the administration of passwords and the login, but by a full support for managing privileged sessions at runtime. Vertically by not only focusing on few highly privileged users, but all types of privileged users, well beyond the IT administrators.