SOCIAL


LATEST BLOGS


Password Management Problems: Employees Significantly Increasing Risk of Security Breaches

20th April 2015

Managing passwords is not a new thing. But, we are seeing a renewed focus on it due to the rapid adoption of new technologies – […]


2014 Market Pulse Survey: Employees Going Rogue with Corporate Data in the Cloud

17th April 2015

We’ve known for some time that the adoption of cloud technologies would have a significant impact on the enterprise, and that when SaaS applications started […]


LATEST TWEETS

SEMINARS

Wednesday 21st June, 2017

The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.

SESSIONS

SEMINAR 1
A Crash Course in IAM Essentials

Exploring the key elements needed for a comprehensive IAM strategy that considers people, processes and technology issues.

SEMINAR 2
The Important Role of Identity Analytics

We give you an overview of the critical role of analytics for your IAM project.

SEMINAR 3
Simplifying User Authentication

With the advent of cloud computing and enterprise mobility, access management has become more complicated. A critical issue facing IT departments is how to make access faster while also effectively managing security risks. Maintaining separate passwords and authenticating access to different applications can be a frustrating experience that can result in lack of productivity and revenue losses for businesses. This seminar explores how large enterprise can simplify user authentication, saving time and money.

SEMINAR 4
IAM Architectures in the Cloud

The advent of Cloud is transforming the way businesses implement IAM. As organisations extend their IT infrastructures, they are faced with different on premise and cloud-based identity stores as users have multiple identities, both corporate and personal. This seminar will explore the plethora of IDM federation challenges and the opportunities offered by Cloud.

SEMINAR 5
Secure Access Control for the Mobile Enterprise

Identifying five key success factors in secure implementation of BYOD and extending IAM infrastructure to mobile deployments.

SEMINAR 6
Managing Privileges

Exploring how to manage privileged accounts and users, ensuring user credential management and real-time monitoring that delivers precise, context-aware actionable insights and alerts.

SEMINAR 7
Threat Intelligence: Managing Risk with Confidence

Are you underestimating your level of risk? This session looks to showcase successful examples of threat intelligence monitoring and response.

SEMINAR 8
Achieving Data Access Governance

Increasing business efficiency and agility through effective data access governance strategies and practices.

SEMINAR 9
Maximising Identity ROI

Identity Management can help you to improve customer engagement and reach new market segments. Join this session and find out how to maximise your ROI.

SEMINAR 10
Managing User Identities and Access Rights

This seminar explores how a global organisation manages and controls the lifecycle of employee identities and access rights.