SOCIAL


LATEST BLOGS


Facing the multiplicity of identity providers

17th August 2017

Writing modern, secure, identity enabled apps is a non-trivial undertaking. Customers demand or assume modern mobile or web apps allow them to logon using their […]


Password management—a crucial step in cloud identity management

21st June 2017

Identity management once meant provisioning users and managing their passwords in Active Directory. But as  organisations  add more cloud applications to their IT environment, the process of managing users’ identities is getting more complex. One of the major components of identity management is passwords—often the first line of defence when it comes to securing user accounts.  


LATEST TWEETS

SEMINARS

Wednesday 8th November, 2017

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.

SESSIONS

SEMINAR 1
A Crash Course in IAM Essentials

Exploring the key elements needed for a comprehensive IAM strategy that considers people, processes and technology issues.

SEMINAR 2
The Important Role of Identity Analytics

We give you an overview of the critical role of analytics for your IAM project.

SEMINAR 3
Simplifying User Authentication

With the advent of cloud computing and enterprise mobility, access management has become more complicated. A critical issue facing IT departments is how to make access faster while also effectively managing security risks. Maintaining separate passwords and authenticating access to different applications can be a frustrating experience that can result in lack of productivity and revenue losses for businesses. This seminar explores how large enterprise can simplify user authentication, saving time and money.

SEMINAR 4
IAM Architectures in the Cloud

The advent of Cloud is transforming the way businesses implement IAM. As organisations extend their IT infrastructures, they are faced with different on premise and cloud-based identity stores as users have multiple identities, both corporate and personal. This seminar will explore the plethora of IDM federation challenges and the opportunities offered by Cloud.

SEMINAR 5
Secure Access Control for the Mobile Enterprise

Identifying five key success factors in secure implementation of BYOD and extending IAM infrastructure to mobile deployments.

SEMINAR 6
Managing Privileges

Exploring how to manage privileged accounts and users, ensuring user credential management and real-time monitoring that delivers precise, context-aware actionable insights and alerts.

SEMINAR 7
Threat Intelligence: Managing Risk with Confidence

Are you underestimating your level of risk? This session looks to showcase successful examples of threat intelligence monitoring and response.

SEMINAR 8
Achieving Data Access Governance

Increasing business efficiency and agility through effective data access governance strategies and practices.

SEMINAR 9
Maximising Identity ROI

Identity Management can help you to improve customer engagement and reach new market segments. Join this session and find out how to maximise your ROI.

SEMINAR 10
Managing User Identities and Access Rights

This seminar explores how a global organisation manages and controls the lifecycle of employee identities and access rights.