Quantcast
Channel: Presentations – Top Identity & Access Management Software, Vendors, Products, Solutions, & Services

Video: Best Practices for Securing Privileged Access

$
0
0

It’s been proven time and time again: unmanaged, unmonitored privileged accounts are an easy target for both external attacks and malicious insiders— just take a look at some recent data breaches and chances are high the malicious party used a compromised privileged account to increase their permissions.

Due to this common practice Privileged Access Management (PAM)— the monitoring and protection of super user accounts— has emerged as one of the most important aspects of Identity and Access Management (IAM) , and cyber security writ large, today.
But in an organization with thousands of IT assets, it can be difficult to securely manage access to privileged accounts for several reasons:

• There are thousands of privileged passwords.
• Administrator passwords exist on each device and application.
• It is difficult to coordinate changes to shared passwords.

When there are many shared, static passwords, former IT staff retain sensitive access after leaving an organization. It can also be difficult to trace changes back to individuals who made them.

In this hour-long webinar from Hitachi ID, experts discuss best practices for privileged access management to remediate these problems.


Check out these additional resources: 

 

The post Video: Best Practices for Securing Privileged Access appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.


Contextual Access Management Explained in 2 Minutes

$
0
0

This probably sounds familiar: “Access Management technology is unable to handle modern networks.” The idea is nothing new, but it’s been getting a lot of airtime, as data breach after data breach result from clumsy workplace access management. Now, many are saying that even Role-based Access Control (RBAC) isn’t enough to account for the countless devices, environments, and circumstances of the modern workplace. According to some critics, the answer to these problems is Contextual Access Management. But what exactly does that mean?

In this brief video, clocking in at just over two minutes, experts from Nova Coast, a security and compliance services company, explain what contextual access management is, and how it can be used to alleviate the growing pains of Identity Management in the modern workplace.

Want more on Access Managment? Check out these resources:

The post Contextual Access Management Explained in 2 Minutes appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

RSAC ’17: Unsticking Your Privilged Access Management Program

$
0
0

Nearly every breach involves privilege elevation. To address this problem, most companies will buy a Privileged Access Management (PAM) solution,  which let them manage, monitor, and protect powerful privileged user accounts within the IT infrastructure of an enterprise.

However, many of these PAM solutions stay on the shelf or are woefully under deployed against the vast number of privileged accounts present in an organization. In this 45-minute session, Lance Peterman, Identity and Access Management Architect at Merck, will provide a core understanding of what a PAM program should contain and tips on how to avoid common pitfalls that keep a PAM program from reaching its potential.

The post RSAC ’17: Unsticking Your Privilged Access Management Program appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Measuring Authentication: NIST 800-63 and Vectors of Trust, A Presentation

$
0
0

NIST 800-63-3 went into public review last year. It outlines three new scales for measuring the assurance of an authentication event. Those scales were heavily informed by Vectors of Trust, which is on track to become an IETF informational draft this year. Find out how Vectors of Trust influenced NIST 800-63, and how authentication will be measured in the future domestically and internationally. In this 40-minute presentation with Sarah Squire, Senior Identity Solution Architect at Engage Identity.

The post Measuring Authentication: NIST 800-63 and Vectors of Trust, A Presentation appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Identity Squatting: Laws, Tools and Methods for Security Professionals

$
0
0

In the modern world, there are a thousand reasons to become someone else. Hacking, spying corporate espionage.. even just borrowing credentials to access business files.How far can a person go in creating alternative identities or borrowing identities of others?

Security professions need to know, “who are you really?” We live in a world of avatars, Internet persona, stage names and identity theft. Authenticating people becomes harder every day.

In this 40-minute presentation Ted Claypoole, Partner at Womble Carlyle will explore the laws and regulations addressing identity, and examine which types of impersonation and identity shifts are legal and which can land you in jail.

The post Identity Squatting: Laws, Tools and Methods for Security Professionals appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

IAM Complicated: Why You Need to Know About Identity and Access Management, BSides Nashville

$
0
0

Do you know where identities are born? How can you tell what an identity can and can’t do? What do you do when you realize your refrigerator has an identity of its own? If your IPS blocks your refrigerator you may lose access to your pizza. Identity and Access Management is what connects the identities, accounts, entitlements, roles, permissions, and resources to provide correct access control. All areas of security are dependent on IAM and need to understand how to take advantage of it. This talk will explore the IAM lifecycle showing how to protect it and wreck it along the way.

If your IPS blocks your refrigerator you may lose access to your pizza.

Identity and Access Management is what connects the identities, accounts, entitlements, roles, permissions, and resources to provide correct access control. All areas of security are dependent on IAM and need to understand how to take advantage of it. This hour-long presentation will explore the IAM lifecycle, showing how to protect it (and wreck it) along the way.

 

The post IAM Complicated: Why You Need to Know About Identity and Access Management, BSides Nashville appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Identity Access Management 101, A Presentation

$
0
0

 

 

Identity is the new Enterprise security perimeter. It’s one of the hottest, most important areas in information security today, and it’s also one of the fastest going business segments in IT—but it can also be one of the most confusing.

As technology improves, the volume of terminology around it increases—there’s a seemingly endless torrent of new terminology surrounding Identity Management, and the acronyms just keep piling up—IAM, IDM, PIM, PAM, SIEM, RBAC, SSO,—the list goes on and on. Worst of all, if can be difficult to find an explanation that doesn’t reference another half dozen ciphered terms.

If you are an executive or IT leader challenged with understanding the complex world of identity management, you are not alone.

Luckily, the good folks at OneLogin have  created a presentation that helps explain  some key identity concepts with examples.

OneLogin’s presentation covers:

• Trends in cloud, and the standards to support them
• State of Identity, Digital Trust, Authentication and Access
• Directory Services and Federation
• SSO (Desktop SSO, Web SSO, and Mobile SSO)
• Automating Onboarding Practices, Provisioning and Deprovisioning

This is one of the best basic explanations of Identity Management on the net, so sit back and enjoy this 28-slide presentation, and check out the full on-demand webinar here.

Also, if you need any more explaining check out our Identity Management glossary and our 2016 IAM Buyer’s Guide. 

The post Identity Access Management 101, A Presentation appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Ping Identity: Corporate Overview—Financial Services

$
0
0

Nearly a quarter of data breaches hit the financial sector in 2017. As hackers become bolder and their methods increasingly sophisticated, that number is poised to skyrocket in 2018. Yet the prospect of needing proper identity access management (IAM) to safeguard their assets catches many financial services enterprises off guard.

This presentation from Ping Identity explores the components of a strong identity access management solution, including authentication tools, access security, and enterprise cloud IAM. It also explains how better identity access management can provide a better customer experience and help your enterprise comply with regulatory demands. Ping Identity’s presentation should provide a core understanding of IAM and what a solution can do for you.

The post Ping Identity: Corporate Overview—Financial Services appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.


Crash Course: Identity and Access Management 101

$
0
0

 

 

 

 

When you’re just getting started with your Identity and Access Management (IAM) initiative, the world of Identity management can seem like a frightening,  complicated, and downright confusing place.

First you’ve got to sort through the acronyms—IAM, IdM, FidM, IDaaS, and the list goes on—it can be overwhelming. Then you’ve got to get to the nitty gritty of figuring out which IAM or IDaaS solution is correct for your organization, all the while wading through a sea of vendor-created info designed to sway you towards one solution or another.

This presentation, Identity and Access Management 101 by Jerod Brennen gives a frank and focused “crash course” on Identity and Access Management. Brennen breaks down the “alphabet soup” that makes IAM so confusing, gives straightforward definitions for several top terms, and lays out best practices for those pursuing an IAM reading. Recommended reading for IT pros looking to quickly familiarize themselves with Identity Management.

And watch this for the 10 Best Resources for Evaluating IAM solutions:

The post Crash Course: Identity and Access Management 101 appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.

Deconstructing Identity Analytics for Higher Risk Awareness, RSAC 2017

$
0
0

Identity analytics is the next evolution of the identity governance and access market. This can combine Big Data and advanced analytics to increase identity-related risk awareness and enhance IAM processes. In this 45-minute session from RSAC 2017, Jackson Shaw, IAM expert and Sr. Architect of IAM at One Identity will address how a cloud-based machine learning system can be used to enhance these processes and provide additional risk-related information to enable better real-time decisions.

 

The post Deconstructing Identity Analytics for Higher Risk Awareness, RSAC 2017 appeared first on Top Identity & Access Management Software, Vendors, Products, Solutions, & Services.





Latest Images