-
Play video Radiant Logic Presents: How Verizon Media Navigated Acquisitions
Radiant Logic Presents: How Verizon Media Navigated Acquisitions
This presentation will discuss how they enabled authentication in a zero trust environment by following the principles of least privilege.
23:54
-
Play video PlainID Presents: Can AIM Be Supercharged?
PlainID Presents: Can AIM Be Supercharged?
You will walk away with a framework for implementing modernized access control -Understand the different methods of Access Control that companies are standardizing on, and how to choose the right path for your company.
19:55
-
Play video Ping Identity Presents: How to Measure the Unexpected Value of Customer Identity
Ping Identity Presents: How to Measure the Unexpected Value of Customer Identity
This session will arm you with a powerful conversation to have with your business that will convey the value of customer identity and raise your status within your organization.
24:24
-
Play video Microsoft Presents: A Zero Trust Approach for Today's World
Microsoft Presents: A Zero Trust Approach for Today's World
This session will demystify Zero Trust and dive into steps to start your zero trust journey.
22:51
-
Play video SailPoint Presents: LogMeIns Identity Governance Vision Uses the Power of AI and Machine Learning
SailPoint Presents: LogMeIns Identity Governance Vision Uses the Power of AI and Machine Learning
Watch this identity journey on how AI/ML technologies are integral to their strategy, how the integration of systems and process changes was significant in their process, and the efficiencies they’ll gain with a cloud-first identity program.
25:41
-
Play video Ping Identity Presents: Passwordless Transform Customer Experiences in the New Digital Era
Ping Identity Presents: Passwordless Transform Customer Experiences in the New Digital Era
In this session, we’ll tackle questions around passwordless transformation (and more) in order to help you navigate the critical decisions you’ll need to make as you embark on your passwordless journey.
26:03
-
Play video Auth0 Presents: A Centralized Identity Strategy Using Standards Helps Minimize Threats
Auth0 Presents: A Centralized Identity Strategy Using Standards Helps Minimize Threats
Modern architectures are becoming more distributed and fractured. How can developers continue to develop and build what they understand without having to become identity experts? How can they do that and ensure that their applications remain secure?
27:39
-
Play video Radiant Logic Presents: Battling Repetition & Inefficiency How Colorado Consolidated Identities
Radiant Logic Presents: Battling Repetition & Inefficiency How Colorado Consolidated Identities
This session will talk about how a federated identity and directory service was used to meet this requirement.
16:46
-
Play video Microsoft Masterclass Manage and Secure All Your Apps with Identity as the Control Plane
Microsoft Masterclass Manage and Secure All Your Apps with Identity as the Control Plane
Learn of the core benefits of bringing all applications under one integrated identity platform -Learn about the different integration pathways available to bring all your applications under one IDP and some of the common best practices to follow.
46:24
-
Play video Auth0 Presents: Credential Stuffing Attacks What Are They and How to Combat Them
Auth0 Presents: Credential Stuffing Attacks What Are They and How to Combat Them
Learn how credential stuffing attacks work, what effect they can have on your company, and how you can fight back.
24:49
-
Play video PlainID Presents: A Conversation Implementing Policy Based Access Control
PlainID Presents: A Conversation Implementing Policy Based Access Control
Hear from a panel of experts who discuss how to modernize IAM with PBAC for robust access control, entitlement management and more.
21:12
-
Play video Microsoft Presents: Identity Governance for All your Users Made Easier Through Analytics
Microsoft Presents: Identity Governance for All your Users Made Easier Through Analytics
Come learn how analytics can help you: •drive user productivity through automatically granting access to SaaS applications based on usage patterns •drive better recommendations and automation for reviewers who periodically review access •programmatic
18:43
- Load More