Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

A Unified Approach to Identity Security

Mixing and matching cybersecurity tools from different vendors can create a fragmented IAM infrastructure laden with exposure gaps. But the ‘one threat, one tool’ model can only be met if your security platform reaches all parts of your identity landscape – from Active Directory to the cloud apps, from 2FA to PAM and governance.  

One Identity has the single most complete identity platform on the market. KuppingerCole states, “[One Identity] is one of the few vendors that covers all major areas with their own solutions.”  

Learn how One Identity can help you: 

  • Start with any piece of the IAM puzzle to build up a unified identity platform customized to you 
  • Utilize varied deployment models, whether SaaS, hybrid, on-premises or private cloud 
  • Get more efficient support, faster time-to-value and a pre-validated, pre-integrated portfolio 
  • Level-up your workforce’s skill set with a single vendor stack 
Join industry experts in each of the following webinars to learn how to unify your identity security.




Sélectionner vos événements


En ligne

Aug.

8

Time: 10:00 AM EST
Location: Microsoft Townhall

Authorization? Delegation? Everyone knows these are crucial aspects of digital security – but what exactly makes them so important? 

Join industry experts in this live webinar to learn the pivotal relationship between authorization and delegation within the dynamics of identity management. Gain insights into various authorization models, such as role-based access control (RBAC) and attribute-based access control (ABAC) and: 

  • Examine how authorization and delegation create a balanced and flexible security framework 
  • Review best practices for different authorization models 
  • Discover effective integration strategies through delegation mechanisms 

Speakers: 

  • Alan Radford, Global IAM Strategist, One Identity 
  • Vipin Jain, Product Management - Active Roles, One Identity 

a la demande

Jul.

9

Your organization’s sensitive digital information deserves the best protection it can get, but vulnerabilities can always be exploited. And with traditional security methods like passwords and SSH keys slowly but surely becoming outdated in the face of modern cyberthreats, focus should shift to more advanced secrets-management strategies. 

Enter Safeguard, a leading solution in the realm of Privileged Access Management (PAM). Hear from security experts in this on-demand webinar to learn how Safeguard's innovative features can transform your organization's approach to secrets management and enhance overall security posture, and to: 

  • Explore the evolution from passwords and SSH keys to advanced secrets management 
  • Discover strategies to mitigate risks associated with poor password practices 
  • Learn how Safeguard features ensure secure and controlled password management 
  • And more

Speakers: 

  • Richard Hosgood - PAM Principal Engineer, One Identity
  • Jason Moody - PAM Global Product Marketing Manager, One Identity

  

a la demande

Jun.

25

In this third and final installment of a three-part webinar series, 'Unlock the Future of Identity and Access Management with OneLogin and Intragen,' experts cover specific advanced use cases.

Join this webinar to learn how you can:

  • Enhance RDP security with One Identity Cloud PAM Essentials
  • Bring your own MFA for secure B2B authentication
  • Protect SaaS admin access with PAM Essentials
  • Easily migrate from Okta to OneLogin

Panelists:

  • Stuart Sharp - VP of Product Strategy, One Identity 
  • Kalle Niemi - Business Consultant, Intragen

a la demande

Jun.

18

Managing authentication across a sprawling IT architecture can be daunting. From managing tons of end users with bad password habits to navigating a complex architecture of applications, both legacy and cloud-based, the authentication struggle is real. 

Get expert insights with One Identity’s Sr. Manager of Solution Engineering, Mark Cockbill, and Solution Engineer, Solenne Le Guernic, on how to ensure a flexible yet secure user experience.

Join this webinar to explore: 

  • The different challenges that come with complex IT architectures 
  • Strategies to help bring order to the chaos  
  • Ways to protect your organization’s applications beyond standard suites for security/flexibility 

Don’t let your complicated IT environment make adding authentication more difficult than it needs to be. 

a la demande

Jun.

18

Watch the second episode of our exclusive webinar series, 'Unlock the Future of Identity and Access Management with OneLogin and Intragen,' co-hosted by Intragen and One Identity. In this webinar, we cover specific use cases focusing on One Identity’s Identity as a Service (IDaaS) for small and medium-sized businesses and enterprises.

Showcased demos:

  • Seamless onboarding & offboarding
  • OneLogin password resets
  • Dynamic MFA options
  • Passwordless authentication in action

Panelists:

  • Kalle Niemi, Lead Business Consultant, Intragen
  • Peter Bastiaansen, Client Executive (Netherlands), Intragen

a la demande

Jun.

11

Identity is the key component in securing data, intellectual property, and the business processes that keep organisations running. Watch the first episode of our exclusive webinar series, 'Unlock the Future of Identity and Access Management with OneLogin and Intragen,' co-hosted by Intragen and One Identity, featuring OneLogin experts. Discover how the OneLogin solution can transform your organisation's Identity and Access Management (IAM) strategy through enhanced security and seamless automation.

Join us to:

  • Gain a comprehensive overview of IAM and IDaaS solutions, focusing on security and automation
  • Learn why a unified platform approach is the way forward and how access management is a crucial part of this strategy
  • Understand the importance of preparation, best practices for IAM projects and internal buy-in, and how a professional partner like Intragen can simplify the process

Panelists: 

  • Stuart Sharp - VP of Product Strategy, One Identity 
  • Kalle Niemi - Business Consultant, Intragen
  

a la demande

May

14

In a world of deep fakes and AI horror stories, are there any benefits to using AI in something as vitally important as your identity access management (IAM)?  

One Identity field strategist Robert Byrne explores the limitations and concept of ‘AI’ – does it mean what we think it means? – and investigates how AI is used in solutions like NLP and CoPilot. Stream the on-demand webcast to examine the opportunities for machine learning methods in IAM, including ways it can help you: 

  • Increase cost-effectiveness and reliability using normal Data Science Methods 
  • Detect, analyze and respond to risk across an identity ecosystem 
  • Monitor and audit the activity of privileged users with automation

a la demande

Apr.

25

Non-human identities are essential components of any organizational landscape, yet their security risks are often underestimated. Just like user accounts, they require constant surveillance and protection. 

In this webcast, experts dive into the world of non-human identities, including bots, DevOps, certificates, service accounts, API keys, machine identities and more.

Join us to: 

  • Discover the roles and vulnerabilities of non-human identities 
  • Learn why/how to safeguard these identities 
  • Gain practical insights to fortify them against evolving risks 

Speakers: 

  • Alan Radford, Global IAM Strategist, One Identity 
  • Dan Conrad, Field Strategist - NAM, One Identity
     

a la demande

Apr.

10

Cybersecurity threats bombard the workforce daily, exploiting the ease of access to your critical data. Privileged Access Management (PAM) is one of your greatest assets to mitigate risk, and One Identity Cloud PAM Essentials offers a commitment to continuous evolution, positioning it as a reliable ally for organizations striving to strengthen their cybersecurity defenses. 

In this webinar, PAM experts will: 

  • Discuss the critical importance of PAM in mitigating risks  
  • Address the challenges of complexity and limited resources facing organizations today 
  • Demonstrate how PAM Essentials can retain simplicity and user-friendliness in your organization 
  • Explore best practices for fighting cyber threats efficiently and effectively with Essentials

Speakers: 

  • Jason Moody: PAM Global Product Marketing Manager, One Identity 
  • Gabe Nichols: R&D Product Management, One Identity   
 

a la demande

Mar.

21

OneLogin's most recent product innovations in the areas of passwordless, desktop-level MFA, adaptive authentication and privilege access management (PAM) collectively address the most pressing access management challenges faced by organizations today.   

Join our webcast with OneLogin experts to learn more about how OneLogin: 

  • Empowers you to eliminate traditional password vulnerabilities 
  • Adds another layer of security to defend against unauthorized access 
  • Assesses user behavior continuously to adapt security measures in real-time  
  • Enforces access controls for critical resources and ensures compliance 

Together, these capabilities not only fortify against evolving cyber threats but also streamline user experiences. In this webcast, our OneLogin team will provide more details about these product innovations, discuss the benefits that they bring to organizations like yours and run some exciting demos to showcase how they work.  

Speakers: 

  • Stuart Sharp - One Identity VP of Product Strategy 
  • Mark Cockbill - One Identity Sr. Manager of Solution Engineering (EMEA) 
  • Sean Robinson - Senior Solutions Engineer (North America) 
  • Solenne Le Guernic - Solutions Engineer (EMEA)

a la demande

Mar.

12

Amidst the groundbreaking impact of DevOps practices on software development, challenges in aligning security measures—especially in privileged access management—have surfaced. This webcast delves into the critical need for seamlessly integrating DevOps methodologies with Privileged Access Management (PAM). 

In this webcast, software development experts explore strategies that emphasize enhanced security, efficiency and collaboration without disrupting the DevOps workflow. Learn how this approach: 

  • Embraces existing vaulting technologies, offering flexibility and eliminating the need for proprietary solutions, aligning security with dev team preferences 
  • Advocates for unified collaboration between security and dev teams, embedding security into the DevOps process from inception 

Learn the importance of prioritizing security without impeding productivity and gain actionable insights to help your organization bridge the divide between DevOps and PAM. 

Speakers: 

  • Rich Hosgood: One Identity PAM Principal Pre-Sales Engineer
  • Jason Moody: One Identity Global Product Marketing Manager 
 

a la demande

Feb.

14

Identity and Access Management (IAM) is a vital component of any cyber security strategy, enabling organizations to regulate and oversee access to their data, systems and resources. But IAM isn’t just a technical solution – it’s a catalyst for business advancement and a crucial shield against risk. 

In this webinar, discover how IAM helps organizations reduce cyber risks, meet regulatory requirements, align with corporate risk management objectives, and influence cyber insurance decisions and premiums.

Experts will explore: 

  • What IAM is and why it’s important for cyber security 
  • How IAM can affect cyber insurance policies and costs 
  • What the key elements and challenges of a successful IAM program are 

Speakers: 

  • Larry J. Chinski, Vice President, Global IAM Strategy | One Identity 
  • Stacey Blanchard, Global Vice President of Professional Services | One Identity 

a la demande

Feb.

6

In an era of distributed and pervasive digital connectivity, cyber threats pose significant physical, financial and reputational risks. Malicious actors are increasingly exploiting identity-focused vulnerabilities and threat vectors to breach our traditional defenses.  

In this webinar, an expert panel explores the identity risk landscape. Join them as they: 

  • Uncover proactive strategies for safeguarding against threats 
  • Dive into the evolving nature of identity challenges 
  • Explore strategies for risk prevention, detection and mitigation  

Enhance your understanding of identity security and gain expert insights to help you develop a resilient identity framework for the digital age. 

Speakers:  

  • Jason Revill - Global leader for Avanade's Identity and Access Management and Data Protection Practice. 

  • Robert Byrne - Field Strategist, EMEA | One Identity 

  • Ted Ernst - Senior Product Manager | One Identity
  

Sélectionnez un ou plusieurs webcasts auxquels vous souhaitez participer avant de vous inscrire.

Veuillez patienter...

triangle-down check
En téléchargeant, vous vous inscrivez pour recevoir des e-mails marketing de notre part. Pour vous désinscrire, veuillez suivre les instructions figurant dans notre politique de confidentialité.

Site protégé par reCAPTCHA. Consultez les conditions d’utilisation et la politique de confidentialité de Google.