Home
Latest Sponsored Events
Related Videos
Webinar Recording
May 20, 2022
Making Zero Trust a Reality: Basing Decisions on Valid Identity Data

Cloud computing and mobile workforces have resulted in an expanding attack surface and a complex web of identify information. This means that traditional perimeter-based security models are no longer effective. A Zero Trust model of strict access control for every user and device enables businesses to be connected and secure, but an effective identity-focused approach is essential.

Webinar Recording
Nov 05, 2021
Delivering on the Promise of an Identity Fabric in a Modern Enterprise

Identity sprawl is a challenge facing most modern enterprises as a result of inorganic growth, piecemeal identity solutions, and more recently, a loss of control due to unplanned remote work. This sprawl leads to tremendous technical debt and has turned identity and access management into a roadblock for many organizations.

Webinar Recording
Nov 12, 2010
XACML Based Authorization - Considerations for an Efficient and Flexible Architecture
Kuppinger Cole Webinar recording