Webinars

Upcoming Webinars

Webinar

Upgrade your IAM with IDaaS IGA

The Identity-as-a-Service (IDaaS) market continues to develop with a significant push from organizations looking to adopt cloud-based delivery of security services including IAM. While IDaaS Access Management solutions, providing SSO (Single Sign-On) for the users and access to a variety of services are already established, IDaaS IGA is not as widely used yet. However, shifting IGA (Identity Governance and Administration) capabilities, e.g. Identity Lifecycle Management and Access Governance, to the cloud might provide significant benefits regarding time and cost of deploying and operating...

Webinar

API Management and Security: Don’t Trade Protection for Convenience

Once a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital business. As companies are struggling to maintain their business agility, to react to the ever-changing market demands and technology landscapes, the need to deliver a new application or service to customers as quickly as possible often trumps all other considerations.

Webinar

Improve Security With Critical Infrastructures Requirements

Organizations or institutions that are essential for the public are called Critical Infrastructures (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations.

Past Webinars

Webinar

Identity Fabrics for True Digital Transformation

Business models are changing, customer relationships are changing, and business partnerships are far more volatile than ever before. Workloads are shifting to the cloud and to as-a-service models. Businesses are looking to provide more and more digital services to their customers and consumers...

Webinar

Extending Beyond the Limits of Multi-Factor Authentication With Continuous Adaptive Trust

The Identity and Access Management (IAM) market is undergoing rapid and at times transformative change. A steady progression from on-premises to API and cloud platforms is visible as vendors innovate, but authentication tools are under attack from determined adversaries.

Webinar

On the Way to Becoming a Cognitive Enterprise

The digitalization has resulted in the "digital enterprise". It aims at leveraging previously unused data and the information hidden in it for the benefit of the enterprise. The “cognitive enterprise” comes with the promise to use this information to do something productive, profitable and highly...

Webinar

Fighting Fraud With Strong Authentication

Strong authentication is one cornerstone of web security. However, account enrollment and account recovery processes are leaving gaps in the credential management lifecycle that allow bad actors to perform account takeover and get into our networks. Increasingly, these bad actors aren’t even...

Webinar

6 Myths of Privileged Access Management Busted

Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.

Webinar

Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?

Application and infrastructure architectures are continuously changing in order to mirror the demands and challenges of organizational needs. A common problem with legacy systems is the inability to understand and adapt to the new business models in an ever-changing world.

Webinar

KuppingerCole Identifies Leaders in Consumer Authentication

Password-based authentication is insecure, leads to a poor customer experience, and is costly for businesses to maintain. Knowledge-based authentication, often used for password resets, is even more insecure given that the answers to individuals’ security questions are often found online....

Webinar

Getting a Grip on Your AI: Know What It Does. Understand the Risks and Rewards. Be Compliant

The case for integrating AI into business processes is ever stronger. Now it’s time to assess realistically what it can do for you. Existing successes and failures of AI beta-phase testing show how to resist the survivorship bias when implementing your own AI programs. Clarify the characteristics...

Webinar

Complying With PSD2: Everything You Need to Know

With the Revised Payment Service Directive (PSD2) coming into full effect this fall, banks and online retailers need to adapt to changes that carry with them many regulatory and technical challenges. Acknowledging these extensive changes, Germany’s Federal Financial Supervisory Authority (BaFin)...

Webinar

KuppingerCole’s Evaluation of Leading Vendors in the Identity API Platforms Market

Many different factors are driving Digital Transformation in the market today. One factor is the change in how businesses interact with their customers. Another factor is more on the technical side that addresses the implementation of new Digital Services that have become more complex due to the...

Next Webinar

Webinar

Upgrade your IAM with IDaaS IGA

Language:

English
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Dec 17, 2019 4:00pm CET, 10:00am EST, 7:00am PST
Register Now

Popular Webcasts

Next Conference

Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00