Call us 

Discovering Identity and Access

Management Solutions

Tag Archives: IAM Webinar

Webinar: Control Access to Applications with our Secure Application Launcher

Post Image

Webinar: Control Access to Applications with our Secure Application Launcher Lieberman RED Identity Management’s Secure Application Launcher enables you to essentially “white list” applications authorized staff can launch with the administrative credentials. RED Identity Management makes it easy to configure secure access with optional session recording, to a wide variety of enterprise applications such as […]

Post Tagged with ,
Read More

Webinar – Secure the cloud: how to lock down access to SaaS and IaaS

Post Image

Secure the cloud: how to lock down access to SaaS and IaaS Wednesday, March 1st, 2017 11am MT / 1pm ET / 10am PT As organizations move their application inventory out of private data centers to public cloud providers, login pages are exposed to public URLs. This eliminates the network perimeter as a first line […]

Post Tagged with ,
Read More

Designing a Break Glass Process to Provide Security for Privileged Accounts

Post Image

Designing a Break Glass Process to Provide Security for Privileged Accounts In this live webinar, join Cyber Security Expert, Derek A. Smith who will cover the following areas. – Access Control Model general overview – Break Glass Defined – Examples of situations when ‘break glass’ emergency access might be necessary – The Break Glass Solution […]

Read More

Webinar : Best Practices for Improving Enterprise Security with Identity

Post Image

Webinar : Best Practices for Improving Enterprise Security with Identity Date: Jan 30, 2017 Time: 11 AM ET Presenters: Matt Klassen, Director Product Marketing 82% of CIOs increased their security spend in 2016 making security the top spending priority for 5 years in a row. This is probably not a surprise for most IT or […]

Post Tagged with , ,
Read More

Webinar – 2017 IAM Resolutions Inspired by Surprising Digital Transformation Stats

Post Image

Webinar – 2017 IAM Resolutions Inspired by Surprising Digital Transformation Stats Date: Jan 19, 2017 Time: 11 AM ET Foin Patrick Harding, CTO of Ping, and Michael Sanchez, Principal Technical Analyst at Sharp Healthcare as they share the most effective strategies for accelerating the transition of your employees, partners and customers to mobile, cloud and […]

Post Tagged with
Read More

Ping Identity Webinar – Putting Privacy to Rest

Post Image

Ping Identity Webinar – Putting Privacy to Rest Date: Jan 17, 2017 Time: 11 AM ET pics will include: – An overview of the changing regulatory landscape – Managing a global user namespace in a dynamic regulatory landscape – Privacy for IoT Devices – Technical user consent examples – Making privacy management transparent to customers […]

Read More

Webinar – The Future is Now: What’s New in ForgeRock Access Management

Post Image

Webinar – The Future is Now: What’s New in ForgeRock Access Management January 10, 2017 8:00AM to 9:00AM PST 4:00PM to 5:00PM GMT In this webinar, learn how new capabilities in ForgeRock Access Management: – Enable cloud automation for dynamic architectures – Dramatically improve security – Ensure future-proofing for in-demand technologies such as DevOps and […]

Post Tagged with ,
Read More

Webinar: Is Your Active Directory as Secure as You Think?

Post Image

Webinar: Is Your Active Directory as Secure as You Think? Date: Tuesday, October 25th at 1pm PT / 4pm ET Speakers: Russell Rice, Senior Director, Product Management, Skyport Systems and Pete Fox, Vice President, Cyber Services, Ascent Solutions LLC It is reported that 75 percent of all breaches involved the loss or theft of privileged […]

Post Tagged with ,
Read More

Webinar : Identity Relationship Management The Right Approach for a Complex Digital World

Post Image

Webinar : Identity Relationship Management The Right Approach for a Complex Digital World October 25, 2016 8:00AM to 9:00AM PDT 4:00PM to 5:00PM BST In this live webinar, ForgeRock experts will show you: • How identity can be used for more than just allowing people to login to applications, and how it is the key […]

Post Tagged with , ,
Read More

Webinar: They Are Who We Thought They Are – The Need for Identity and Access Management

Webinar: They Are Who We Thought They Are – The Need for Identity and Access Management Date: Thursday, October 13, 2016, 01:00 PM EDT Ensuring users are accurately identified and have access to applications and services that they are authorized to use is essential to cyber security. Organizations require a comprehensive and accurate solution that […]

Post Tagged with ,
Read More