Search

Page 28 of 1000 results

Combined Session

Panel: The Changing Landscape of Policy-driven Authorization: A Discussion of NextGen Use Cases • Implementation of Role-Based Access Control in a Mid-sized Financial Institution • Why Prevention No Longer Works? A New Approach Using AI for Identity Management

by Eve Maler, Gerry Gebel, Patrick Parker, Raghu Dev, Dimitri Chichlo, Gal Helemski

... a critical component of the Identity & Access Management landscape. Where identity lays the ... , risk is that employees accumulate undue privileges or that accounts are forgotten and ... IT employees who obviously have extended privileges. The process of creation is often slow ...

Expert Talk

Securing Privileged Accounts in the Cloud • Protecting Privileged Active Directory and Local Accounts • Privileged Account Management Roadmap

by Patrick Parker, Christian Götz, Michael Breier

... challenge, privileged accounts in cloud environments are at a critical juncture of control and management because ... once an unauthorized user has access to privileged account credentials ... appropriate solutions while dealing with privileged accounts in modern cloud architectures ... an organization’s overall security around the management of Privileged Identities. A multi-phased approach will ... increase the maturity of an organization’s approach to Privileged Account Management.

Video

Martin Kuppinger - User Behaviour: The Link between CyberSecurity and Identity Management

by Martin Kuppinger

An increasing number of attacks, both external cyber-attacks and internal attacks, are well-thought-out and long-running. Particularly external, targeted attacks rely on the use of zero-day-exploits, which factually are yet unknown exploits. Thus, standard approaches such as signature-based analysis don’t help – you can’t detect what you don’t know. On the other hand, malicious behavior of internal users is hard to detect. Commonly, existing entitlements are used, but not as they should be used. Both ...

Keynote

User Behaviour: The Link between CyberSecurity and Identity Management

by Martin Kuppinger

An increasing number of attacks, both external cyber-attacks and internal attacks, are well-thought-out and long-running. Particularly external, targeted attacks rely on the use of zero-day-exploits, which factually are yet unknown exploits. Thus, standard approaches such as signature-based analysis don’t help – you can’t detect what you don’t know. On the other hand, malicious behavior of internal users is hard to detect. Commonly, existing entitlements are used, but not as they should be used. Both ...

Expert Talk

Identity & Access Management out of the Cloud • Revealed – Your Access Governance Blind Spot. How to Protect your Organisation from Financial and Reputation Losses • SSH Keys. Trusted Access out of Control

by Alessandro Festa, Dietmar Krüger, Rami Raulas

... challenging existing Identity & Access Management deployments and processes of organizations ... cloud-based Identity & Access Management services. With Identity Protect ... and expensive on-premises Identity & Access Management deployments by means of managed Identity & ... dangerous blind spot when it comes to privileged access governance. Many organisations are ... access for regular users and privileged users in separate silos, blind ... to the risks of their failure to address privileged access governance (PAG) as part of a ...

Executive View

Auth0 Customer Identity Management

by John Tolbert

... order to exploit the elevated privileges that they possess. Whether the ... include compromising passwords and using privileged accounts. Eliminating passwords is an ... industries. Consumer Identity and Access Management is a sub-genre of ... Product Description Auth0 Customer Identity Management is a modular identity platform ... For authentication, Auth0 Customer Identity Management supports: Custom credentials: username + ... the Auth0 Customer Identity Management Adaptive Authentication functionality. Administrators ...

Expert Talk

Simplify Cloud Access and Provisioning with a Federated Identity Service • Can Access Management Drive Cloud Transformation? • Digital Identity Authorities - the Key to Enterprise Cloud Transformation

by Michel Prompt, Loren Russon, Stuart Sharp

... applications Saving time by simplifying the management of users and groups The ... OneLogin Unified Access Management Platform is purpose-built for ... privileges across all applications in real time vs. days or weeks, and slash access management ... all with a single Unified Access Management Platform. This platform unifies access ... user directories. Telekom's Unified Access Management Platform powered by OneLogin unites entrance ... and implementing identity and access management (IAM) services across data ...

Webinar

The Seven Keys to a Successful Privileged Account Management Strategy

... to control, monitor, and audit privileged access in order to mitigate the ... strategy for effective Privileged Account Management (PAM) are the management and automatic ... rotation of password, least privileged access, ... not only at the privileged level using a password management solution, but also ... we will discuss: Where many privileged account management strategies fall short How a ... give advice on where to begin a privileged account management project, how to progress to a higher ...

Webinar

How to Ensure the Success of Your Privileged Access Management Projects

... to shore up their defences start with privileged access management (PAM). However, success is not ... ones of other accounts with elevated privileges? What about restricting access in administrator ...

Whitepaper

Ping Identity solutions for Customer Identity and Access Management

by John Tolbert

... or within the EU today. Consumer Identity Management Business Drivers Digital transformation is an objective ... pdf. Consumer Identity Management Challenges Customer identity management solutions can help ... VPNs. PingDirectory for customer profile management PingDirectory is the identity repository, ... be configured to alert administrators when elevated privileges are employed by users in the system ... developers to customize programmatic access. > Consent management is critical for GDPR compliance PingDataGovernance ...