Webinar Recording

In an Age of Digital Transformation Managing Vendor and Partner Identity Is Critical

Show description
Speakers
Paul Fisher
Lead Analyst
KuppingerCole
Paul Fisher
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...
View profile
David Pignolet
President & CEO
SecZetta
David Pignolet
With nearly two decades of experience in application, network, and data security, David Pignolet founded SecZetta in 2006, assembling a highly-experienced team and securing strategic partnerships to address a growing need for better IT security and identity and access management in...
View profile
Lead Sponsor
SecZetta
Top related content
Webinar Recording
Re-Imagining Identity Management for the Digital Era
Mar 10, 2023

Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those challenges are likely to evolve, and what could be done to meet current and future needs.

Participate in the debate between Martin Kuppinger, Principal Analyst at KuppingerCole Analysts and Gautam Singh Deo, Director - Strategic Business Engagements at ARCON as they discuss how to move beyond siloed approaches to ensure a security outcomes approach that is focused on identity.

Put your questions forward as our experts consider how best to achieve an identity-centric strategy that combines the best of Zero Trust, IAM, IGA and PAM, and as they explore the benefits of a converged identity security approach using Contextual Data Models.

Webinar Recording
Zero Trust: Solving IT Security’s Identity Crisis
May 04, 2018

Although companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters.

Webinar Recording
Meeting the Identity and Access Challenges in a Multi-Cloud World
Oct 20, 2021

Multi-cloud deployments are becoming increasingly common as organizations seek to remain competitive in the digital economy and address demands for increased remote working. But while cloud migration is enabling business success, it is not without its identity and access challenges.

Join experts from KuppingerCole Analysts and Beyond Trust for a discussion about the risks associated with cloud environments and how to use IAM and PAM to protect this expanded attack surface against threat actors.  

Paul Fisher, Senior Analyst at KuppingerCole outlines the identity and access challenges associated with multi-cloud deployments. He explains why IAM is essential, and why PAM is also important in terms of traditional privileged access management and secrets management.  

Brian Chappell, Deputy CTO at Beyond Trust highlights the need to address the complexity and interoperability issues arising from siloed identity stores, native toolsets, and conflicting shared responsibility models. He also outlines the benefits of standardizing management and security controls across the IT ecosystem, and other cloud security best practices.  

Webinar Recording
Solving New Authentication Challenges While Finding Parity Between User Experience and Security
Jan 16, 2019

In an increasingly hostile world, where you don't know who to trust, companies still need to be able to deliver trusted, personalized experiences for users, without making them jump through hoops to prove who they are.

Webinar Recording
Identity Security: A Top Priority for the Modern Enterprise
Dec 15, 2021

Accelerated digital transformation has led to an explosion of digital identities, which means any user can have some level of privileged access at some time. Cyber attackers are targeting this rapidly expanding attack surface. This means identity security, has never been more important or challenging.

Webinar Recording
Zero Trust Through Identity-Based Segmentation
Jul 21, 2021

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict identity verification and access control for every user or workload offers an alternative that secures data while ensuring it is accessible to those who need it.

Webinar Recording
2020 Is the Year of the Identity Management Revolution
Oct 14, 2020

2020 has been the year of dispersed workforces and working environments. The impact on existing infrastructure, strategies and legacy technology has been unprecedented. As a result, we embarked on a revolution for Identity & Access Management and a mind-set change for organizations big and small, global or local. Never before has IAM been more present and upfront. In this new world, trusted identities need to be the starting point for all organizational strategies and driving organizational change.

Webinar Recording
Mastering the Digitalization of Business: Digital Identities and the Cloud
Jan 20, 2015

How to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level

It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their business, but keeping it secure anyway. It is about enabling business agility while not ending up with unprecedented risks. Combining business innovation with IT innovation, particularly around identities and the cloud, is the foundation for successfully mastering the digital revolution.

Webinar Recording
Accelerate Your Digital Transformation Through Identity
Jun 30, 2021

Employee Identity & Access Management (IAM) and Consumer Identity & Access Management (CIAM) are typically separate in terms of governance, processes, and technology. But, by leveraging the synergy between the two, businesses can achieve better sales opportunities as well as faster digital transformation, better customer journeys, and improved security, privacy, and compliance.