Zero Trust Azure Application Migration 101: Onboard Applications like a Pro!

Watch the Previously Recorded Webinar

Join our experts as they delve into the topic of Zero Trust and how it can be applied to Azure Application Migration. They will discuss the benefits of implementing a Zero Trust strategy and the key considerations and best practices for successful onboarding of applications in Azure. During the webinar, you will learn: The basics of Zero Trust and how it applies to Azure Application Migration, Best practices for implementing a Zero Trust strategy for onboarding applications, Key considerations for successful onboarding of applications in Azure.

See Webinar Recording

Azure Identity Management

Watch the previously recorded Webinar

Learn about the emerging importance of Azure Active Directory as more than a directory and why it is important to connect all your applications to a single Cloud identity service.

See Webinar Recording

Azure RBAC Management

Watch the Previously Recorded Webinar

The elastic nature of the Azure infrastructure and the ability to allow rapid changes such as self-provisioning and de-provisioning of new services and IT resources make it difficult for security and audit teams to meet their regulatory obligations concerning asset management. Take control of your Azure RBAC security. Optimize your Azure security landscape and ensure compliance with your corporate risk policies.

See Webinar Recording

Azure License Management

Watch the previously recorded Webinar

This webinar highlights the five most common challenges of managing Azure/O365 licenses and discusses solutions for each that allow organizations to generate significant cost and time savings.

See Webinar Recording

Extending Active Directory to Office 365

Watch the Previously Recorded Webinar

This webinar highlights potential pitfalls with Identity and Access Management of Office 365 and discusses best practice solutions for each.

See Webinar Recording

Upgrade your SSO by combining RBAC/ABAC into the experience

We address the following issues

  • Today’s SSO solutions have missed the mark
  • Active Directory Group restrictions aren’t enough
  • RBAC/ABAC - What it means for your environment
  • What the future of SSO looks like
  • What the future of SSO looks like
  • Intelligent access control of your SAML and WS-Federation applications
See Webinar Recording

Watch CEO Patrick Parker’s Keynote at the European Identity & Cloud Conference 2017

Identity is Not the New Perimeter: Slaying IAM’s Sacred Cows

Identity as the New Perimeter is a sleek and sexy term that seems to perfectly encompass the modern world in which we live dominated by talk of IoT, Cloud, BYOD, Big Data, AI, CIAM, and other buzzworthy acronyms. Unfortunately, it and other equally unquestioned and under-analyzed IAM mantras do more harm than good by oversimplifying and distracting IAM practitioners from the reality of the security threats facing our organizations today.

In this session, we will question a number of outdated and inaccurate commonly held IAM beliefs and replace them with actionable and impactful techniques such as Micro-Segmentation, Zone-Based Security, Defense in Depth, Least Privilege and others. We will also highlight the central role of IAM in delivering on these strategies.

See Webinar Recording

Watch CEO Patrick Parker’s Keynote at the European Identity & Cloud Conference 2016

Reimagining Identity and Access Management Processes with Algorithms

We are on the brink of a machine learning revolution in which computers won't just speed up existing security processes but enable the automation of processes and decisions too complex for the human mind to imagine.

See Webinar Recording

Watch CEO Patrick Parker’s Keynote at the European Identity & Cloud Conference 2015

Getting a Grip on Both Microsoft Azure and Amazon AWS

As organizations race to transplant onsite infrastructure and applications to the Cloud, strong yet flexible control over authorization will play a critical role...

See Webinar Recording

Watch CEO Patrick Parker’s Keynote at the European Identity & Cloud Conference 2014

IAM Meat and Potatoes Best Practices

Identity and Access Management projects can be the most complex and riskiest that an organization will undertake. In this conference keynote, CEO Patrick Parker addresses the most common pitfalls and offers best practices to avoid them and ensure project success.

See Webinar Recording