Quantcast
Channel: Presentations – Top Identity & Access Management Software, Vendors, Products, Solutions, & Services
Viewing all 35 articles
Browse latest View live

Contextual Access Management Explained in 2 Minutes

$
0
0

This probably sounds familiar: “Access Management technology is unable to handle modern networks.” The idea is nothing new, but it’s been getting a lot of airtime, as data breach after data breach result from clumsy workplace access management. Now, many are saying that even Role-based Access Control (RBAC) isn’t enough to account for the countless devices, environments, and circumstances of the modern workplace. According to some critics, the answer to these problems is Contextual Access Management. But what exactly does that mean?

In this brief video, clocking in at just over two minutes, experts from Nova Coast, a security and compliance services company, explain what contextual access management is, and how it can be used to alleviate the growing pains of Identity Management in the modern workplace.

Want more on Access Managment? Check out these resources:

The post Contextual Access Management Explained in 2 Minutes appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.


Provisioning IDaaS: Using SCIM to Enable Cloud Identity

$
0
0

 

 

SCIM (System for cross-domain identity management) is an open standard that simplifies user provisioning by defining a set of REST APIs to create, update, delete users, and assign/unassign them to roles. In this session you’ll learn how you can use SCIM to provision users from your on-premises directory to the cloud, and vice-versa; and see this in action with the Salesforce platform.

The post Provisioning IDaaS: Using SCIM to Enable Cloud Identity appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

On the Security and Privacy of Modern Web SSO, Presentation from 33c3

$
0
0

Many websites allow users to log in with their Facebook or Google account. This web-based single sign-on (SSO), as it’s called, mostly uses the standard protocols such as OAuth and OpenID Connect, but how secure are these protocols? And what can go wrong?

In this 64-minute presentation from the 33rd Chaos Communication Congress (33c3),  an annual conference organized by the Chaos Computer Club in Hamburg, DE, speaker Guido Schmitz breaks down the disadvantages of OAuth and OpenID Connect and demonstrates what can go wrong with them.

Schmitz will also examine Mozilla’s proposed authentication protocol, BrowserID (a.k.a. Persona), and discuss whether their proposition really solved the privacy issue, the lessons learned and what we can do better.

 

The post On the Security and Privacy of Modern Web SSO, Presentation from 33c3 appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Crash Course: Identity and Access Management 101

$
0
0

 

 

 

 

When you’re just getting started with your Identity and Access Management (IAM) initiative, the world of Identity management can seem like a frightening,  complicated, and downright confusing place.

First you’ve got to sort through the acronyms—IAM, IdM, FidM, IDaaS, and the list goes on—it can be overwhelming. Then you’ve got to get to the nitty gritty of figuring out which IAM or IDaaS solution is correct for your organization, all the while wading through a sea of vendor-created info designed to sway you towards one solution or another.

This presentation, Identity and Access Management 101 by Jerod Brennen gives a frank and focused “crash course” on Identity and Access Management. Brennen breaks down the “alphabet soup” that makes IAM so confusing, gives straightforward definitions for several top terms, and lays out best practices for those pursuing an IAM reading. Recommended reading for IT pros looking to quickly familiarize themselves with Identity Management.

And watch this for the 10 Best Resources for Evaluating IAM solutions:

The post Crash Course: Identity and Access Management 101 appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Deconstructing Identity Analytics for Higher Risk Awareness, RSAC 2017

$
0
0

Identity analytics is the next evolution of the identity governance and access market. This can combine Big Data and advanced analytics to increase identity-related risk awareness and enhance IAM processes. In this 45-minute session from RSAC 2017, Jackson Shaw, IAM expert and Sr. Architect of IAM at One Identity will address how a cloud-based machine learning system can be used to enhance these processes and provide additional risk-related information to enable better real-time decisions.

 

The post Deconstructing Identity Analytics for Higher Risk Awareness, RSAC 2017 appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

RSAC ’17: Unsticking Your Privilged Access Management Program

$
0
0

Nearly every breach involves privilege elevation. To address this problem, most companies will buy a Privileged Access Management (PAM) solution,  which let them manage, monitor, and protect powerful privileged user accounts within the IT infrastructure of an enterprise.

However, many of these PAM solutions stay on the shelf or are woefully under deployed against the vast number of privileged accounts present in an organization. In this 45-minute session, Lance Peterman, Identity and Access Management Architect at Merck, will provide a core understanding of what a PAM program should contain and tips on how to avoid common pitfalls that keep a PAM program from reaching its potential.

The post RSAC ’17: Unsticking Your Privilged Access Management Program appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Measuring Authentication: NIST 800-63 and Vectors of Trust, A Presentation

$
0
0

NIST 800-63-3 went into public review last year. It outlines three new scales for measuring the assurance of an authentication event. Those scales were heavily informed by Vectors of Trust, which is on track to become an IETF informational draft this year. Find out how Vectors of Trust influenced NIST 800-63, and how authentication will be measured in the future domestically and internationally. In this 40-minute presentation with Sarah Squire, Senior Identity Solution Architect at Engage Identity.

The post Measuring Authentication: NIST 800-63 and Vectors of Trust, A Presentation appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Identity Squatting: Laws, Tools and Methods for Security Professionals

$
0
0

In the modern world, there are a thousand reasons to become someone else. Hacking, spying corporate espionage.. even just borrowing credentials to access business files.How far can a person go in creating alternative identities or borrowing identities of others?

Security professions need to know, “who are you really?” We live in a world of avatars, Internet persona, stage names and identity theft. Authenticating people becomes harder every day.

In this 40-minute presentation Ted Claypoole, Partner at Womble Carlyle will explore the laws and regulations addressing identity, and examine which types of impersonation and identity shifts are legal and which can land you in jail.

The post Identity Squatting: Laws, Tools and Methods for Security Professionals appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.


IAM Complicated: Why You Need to Know About Identity and Access Management, BSides Nashville

$
0
0

Do you know where identities are born? How can you tell what an identity can and can’t do? What do you do when you realize your refrigerator has an identity of its own? If your IPS blocks your refrigerator you may lose access to your pizza. Identity and Access Management is what connects the identities, accounts, entitlements, roles, permissions, and resources to provide correct access control. All areas of security are dependent on IAM and need to understand how to take advantage of it. This talk will explore the IAM lifecycle showing how to protect it and wreck it along the way.

If your IPS blocks your refrigerator you may lose access to your pizza.

Identity and Access Management is what connects the identities, accounts, entitlements, roles, permissions, and resources to provide correct access control. All areas of security are dependent on IAM and need to understand how to take advantage of it. This hour-long presentation will explore the IAM lifecycle, showing how to protect it (and wreck it) along the way.

 

The post IAM Complicated: Why You Need to Know About Identity and Access Management, BSides Nashville appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Identity Access Management 101, A Presentation

$
0
0

 

 

Identity is the new Enterprise security perimeter. It’s one of the hottest, most important areas in information security today, and it’s also one of the fastest going business segments in IT—but it can also be one of the most confusing.

As technology improves, the volume of terminology around it increases—there’s a seemingly endless torrent of new terminology surrounding Identity Management, and the acronyms just keep piling up—IAM, IDM, PIM, PAM, SIEM, RBAC, SSO,—the list goes on and on. Worst of all, if can be difficult to find an explanation that doesn’t reference another half dozen ciphered terms.

If you are an executive or IT leader challenged with understanding the complex world of identity management, you are not alone.

Luckily, the good folks at OneLogin have  created a presentation that helps explain  some key identity concepts with examples.

OneLogin’s presentation covers:

• Trends in cloud, and the standards to support them
• State of Identity, Digital Trust, Authentication and Access
• Directory Services and Federation
• SSO (Desktop SSO, Web SSO, and Mobile SSO)
• Automating Onboarding Practices, Provisioning and Deprovisioning

This is one of the best basic explanations of Identity Management on the net, so sit back and enjoy this 28-slide presentation, and check out the full on-demand webinar here.

Also, if you need any more explaining check out our Identity Management glossary and our 2016 IAM Buyer’s Guide. 

The post Identity Access Management 101, A Presentation appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Ping Identity: Corporate Overview—Financial Services

$
0
0

Nearly a quarter of data breaches hit the financial sector in 2017. As hackers become bolder and their methods increasingly sophisticated, that number is poised to skyrocket in 2018. Yet the prospect of needing proper identity access management (IAM) to safeguard their assets catches many financial services enterprises off guard.

This presentation from Ping Identity explores the components of a strong identity access management solution, including authentication tools, access security, and enterprise cloud IAM. It also explains how better identity access management can provide a better customer experience and help your enterprise comply with regulatory demands. Ping Identity’s presentation should provide a core understanding of IAM and what a solution can do for you.

The post Ping Identity: Corporate Overview—Financial Services appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

International Beta Systems Technology Forum

European Identity & Cloud Conference 2018

$
0
0

Get to the place where the Digital Transformation is alive. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture out of best practice discussion, visionary presentations and networking with a future orientated community. More than 800 participants consisting out of end users and worldwide leading vendors, thought leaders and analyst get together in Munich to be inspired by a high-class list of international top-speakers.

Every year the agenda focuses on latest and upcoming Security Information, Identity and Access Management topics which offer you the foundation to build an agile security strategy for your business, now and in future. Listen to future trends and be prepared for new developments in the era of Digital Transformation.

LOCATION: Munich, Germany  DATE: Tuesday, May 15, 2018 – Friday, May 18, 2018

The post European Identity & Cloud Conference 2018 appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Crash Course: Identity and Access Management 101

$
0
0

 

 

 

 

When you’re just getting started with your Identity and Access Management (IAM) initiative, the world of Identity management can seem like a frightening,  complicated, and downright confusing place.

First you’ve got to sort through the acronyms—IAM, IdM, FidM, IDaaS, and the list goes on—it can be overwhelming. Then you’ve got to get to the nitty gritty of figuring out which IAM or IDaaS solution is correct for your organization, all the while wading through a sea of vendor-created info designed to sway you towards one solution or another.

This presentation, Identity and Access Management 101 by Jerod Brennen gives a frank and focused “crash course” on Identity and Access Management. Brennen breaks down the “alphabet soup” that makes IAM so confusing, gives straightforward definitions for several top terms, and lays out best practices for those pursuing an IAM reading. Recommended reading for IT pros looking to quickly familiarize themselves with Identity Management.

And watch this for the 10 Best Resources for Evaluating IAM solutions:

The post Crash Course: Identity and Access Management 101 appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Deconstructing Identity Analytics for Higher Risk Awareness, RSAC 2017

$
0
0

Identity analytics is the next evolution of the identity governance and access market. This can combine Big Data and advanced analytics to increase identity-related risk awareness and enhance IAM processes. In this 45-minute session from RSAC 2017, Jackson Shaw, IAM expert and Sr. Architect of IAM at One Identity will address how a cloud-based machine learning system can be used to enhance these processes and provide additional risk-related information to enable better real-time decisions.

 

The post Deconstructing Identity Analytics for Higher Risk Awareness, RSAC 2017 appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.


Viewing all 35 articles
Browse latest View live




Latest Images