Presentations Archives - Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services https://solutionsreview.com/identity-management/category/presentations/ Identity Access Management (IAM) News, Best Practices and Buyer's Guide Thu, 02 Mar 2023 16:04:48 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.2 https://solutionsreview.com/identity-management/files/2024/01/cropped-android-chrome-512x512-1-32x32.png Presentations Archives - Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services https://solutionsreview.com/identity-management/category/presentations/ 32 32 What to Expect at the Solutions Spotlight with ManageEngine on March 16 https://solutionsreview.com/identity-management/what-to-expect-at-the-solutions-spotlight-with-manageengine-on-march-16/ Thu, 02 Mar 2023 15:49:34 +0000 https://solutionsreview.com/identity-management/?p=6314 Ray Manash of ManageEngine takes us through a live product demo in a Solutions Review Solutions Spotlight you won’t want to miss. What is a Solutions Spotlight? Solutions Review’s Solution Spotlights are exclusive webinar events for industry professionals across enterprise technology. Since its first virtual event in June 2020, Solutions Review has expanded its multimedia capabilities in […]

The post What to Expect at the Solutions Spotlight with ManageEngine on March 16 appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>

Ray Manash of ManageEngine takes us through a live product demo in a Solutions Review Solutions Spotlight you won’t want to miss.

What is a Solutions Spotlight?

Solutions Review’s Solution Spotlights are exclusive webinar events for industry professionals across enterprise technology. Since its first virtual event in June 2020, Solutions Review has expanded its multimedia capabilities in response to the overwhelming demand for these kinds of events. Solutions Review’s current menu of online offerings includes the Demo Day, Solution Spotlight, best practices or case study webinars, and panel discussions. And the best part about the “Spotlight” series? They are free to attend!

Why You Should Attend

In this demo, ManageEngine’s Ray Manash will discuss how AD360, ManageEngine’s IAM solution, can help strengthen your organization’s cybersecurity posture. He will demonstrate how AD360 has a complete suite of products to help manage identities, secure access, and ensure compliance to help you overcome your IT challenges.

With the next Solutions Spotlight event, the team at Solutions Review has partnered with ManageEngine to provide viewers with a unique webinar featuring an inside look at the vendor’s AD360 platform. Alongside a live product demo, the Spotlight event will also feature an interview about the product with the Customer Success Lead for ManageEngine.

Solutions Review is one of the largest communities of IT executives, directors, and decision-makers across enterprise technology marketplaces. Every year over 10 million people come to Solutions Review’s collection of sites for the latest news, best practices, and insights into solving some of their most complex problems.

Speakers

Ray ManashRay Manash has been associated with ManageEngine for over five years. He provides consultation for IAM and SIEM product suites and facilitates seamless onboarding and implementation for enterprises. He has been meeting prospects and customers across the globe for close to two years now. In these meetings, he understands their IT struggles and recommends/demonstrates products from ManageEngine to make their IT routine less cumbersome.

About ManageEngine

ManageEngineAs the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget. ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Their 120+ award-winning products and free tools cover everything your IT needs. From network and device management to security and service desk software, they’re bringing IT together for an integrated, overarching approach to optimize your IT.

FAQ

  • What: ManageEngine Expert Webinar
  • When: Thursday, March 16, 2023, at 12:00 PM Eastern Time
  • Where: Zoom meeting (see registration page for more detail)

Register for the Solutions Spotlight with ManageEngine for FREE

The post What to Expect at the Solutions Spotlight with ManageEngine on March 16 appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
What to Expect at the Solutions Spotlight with HID Global on August 11 https://solutionsreview.com/identity-management/what-to-expect-at-the-solutions-spotlight-with-hid-global-on-august-11/ Mon, 01 Aug 2022 18:38:07 +0000 https://solutionsreview.com/identity-management/?p=6013 HID Global‘s Scott Kern takes us through a live product demo in a Solutions Review Solutions Spotlight you won’t want to miss. What is a Solutions Spotlight? Solutions Review’s Solution Spotlights are exclusive webinar events for industry professionals across enterprise technology. Since its first virtual event in June 2020, Solutions Review has expanded its multimedia capabilities in […]

The post What to Expect at the Solutions Spotlight with HID Global on August 11 appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>

HID Global‘s Scott Kern takes us through a live product demo in a Solutions Review Solutions Spotlight you won’t want to miss.

What is a Solutions Spotlight?

Solutions Review’s Solution Spotlights are exclusive webinar events for industry professionals across enterprise technology. Since its first virtual event in June 2020, Solutions Review has expanded its multimedia capabilities in response to the overwhelming demand for these kinds of events. Solutions Review’s current menu of online offerings includes the Demo Day, Solution Spotlight, best practices or case study webinars, and panel discussions. And the best part about the “Spotlight” series? They are free to attend!

Why You Should Attend

Is managing your organization’s PKI burdening your IT team and taking them away from mission-critical projects? Relieve their stress by outsourcing the complexity of PKI with HID Global’s award winning, cloud-based, and managed PKI-as-a-Service.

With the next Solutions Spotlight event, the team at Solutions Review has partnered with Identity Access Management (IAM)  giant HID Global to provide viewers with a unique webinar featuring an inside look at the vendor’s PKI-as-a-Service platform. Alongside a live product demo, the Spotlight event will also feature an interview about the product with the VP of Customer and Technical Solutions from HID PKIaaS .

Solutions Review is one of the largest communities of IT executives, directors, and decision-makers across enterprise technology marketplaces. Every year over 10 million people come to Solutions Review’s collection of sites for the latest news, best practices, and insights into solving some of their most complex problems.

Speakers

HID Global Scott KernScott Kern – VP, Customer & Technical Solutions: Scott has over twenty years of experience implementing PKI-enabled solutions that provide identity and authentication capabilities to meet a wide variety of compliance-driven initiatives. He has worked closely with Fortune 100 and other companies and industry partners to implement the benefits of a managed PKI-as-a-Service by reducing complexity and cost while improving security and performance.

About HID Global

HID GlobalHID Global offers an array of solutions ranging from biometric sensors and read modules; these include OEM embedded reader modules and finished desktop readers that validate identity using fingerprints or hard tokens. HID Global’s solutions can integrate into existing business systems, both analog and digital. Its solutions feature advanced multifactor authentication, credential management, and analytics. A philosophy of Zero Trust drives its innovations and facilitates digital certification. HID Global also provides access control systems with support for a wide range of credential technologies. Also, they tailor its specific solutions to match with different verticals and use cases.

FAQ

  • What: HID Global Expert Webinar
  • When: Thursday, August 11, 2022, at 12:00 PM Eastern Time
  • Where: Zoom meeting (see registration page for more detail)

Register for the Solutions Spotlight with HID Global for FREE

The post What to Expect at the Solutions Spotlight with HID Global on August 11 appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
Ping Identity: Corporate Overview—Financial Services https://solutionsreview.com/identity-management/ping-identity-corporate-overview-financial-services/ Tue, 27 Feb 2018 17:00:40 +0000 https://solutionsreview.com/identity-management/?p=2385 [slideshare id=89105206&doc=correctpingpresentationcorporateoverviewfinancialservices-180227192117] Nearly a quarter of data breaches hit the financial sector in 2017. As hackers become bolder and their methods increasingly sophisticated, that number is poised to skyrocket in 2018. Yet the prospect of needing proper identity access management (IAM) to safeguard their assets catches many financial services enterprises off guard. This presentation from […]

The post Ping Identity: Corporate Overview—Financial Services appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
[slideshare id=89105206&doc=correctpingpresentationcorporateoverviewfinancialservices-180227192117]

Nearly a quarter of data breaches hit the financial sector in 2017. As hackers become bolder and their methods increasingly sophisticated, that number is poised to skyrocket in 2018. Yet the prospect of needing proper identity access management (IAM) to safeguard their assets catches many financial services enterprises off guard.

This presentation from Ping Identity explores the components of a strong identity access management solution, including authentication tools, access security, and enterprise cloud IAM. It also explains how better identity access management can provide a better customer experience and help your enterprise comply with regulatory demands. Ping Identity’s presentation should provide a core understanding of IAM and what a solution can do for you.


Widget not in any sidebars

The post Ping Identity: Corporate Overview—Financial Services appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
RSAC ’17: Unsticking Your Privileged Access Management Program https://solutionsreview.com/identity-management/rsac-17-unsticking-your-privilged-access-management-program/ Fri, 03 Nov 2017 15:36:24 +0000 https://solutionsreview.com/identity-management/?p=1590 Nearly every breach involves privilege elevation. To address this problem, most companies will buy a Privileged Access Management (PAM) solution,  which let them manage, monitor, and protect powerful privileged user accounts within the IT infrastructure of an enterprise. However, many of these PAM solutions stay on the shelf or are woefully under deployed against the vast […]

The post RSAC ’17: Unsticking Your Privileged Access Management Program appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
Nearly every breach involves privilege elevation. To address this problem, most companies will buy a Privileged Access Management (PAM) solution,  which let them manage, monitor, and protect powerful privileged user accounts within the IT infrastructure of an enterprise.

However, many of these PAM solutions stay on the shelf or are woefully under deployed against the vast number of privileged accounts present in an organization. In this 45-minute session, Lance Peterman, Identity and Access Management Architect at Merck, will provide a core understanding of what a PAM program should contain and tips on how to avoid common pitfalls that keep a PAM program from reaching its potential.

The post RSAC ’17: Unsticking Your Privileged Access Management Program appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
11 AWS Identity Management Best Practices to Live By https://solutionsreview.com/identity-management/11-identity-management-best-practices-for-aws/ Fri, 20 Oct 2017 18:05:24 +0000 https://solutionsreview.com/identity-management/?p=701 With 30% of the global public cloud computing market share, e-Retail giant Amazon.com’s cloud computing branch, Amazon Web Services, is the most dominant cloud service provider on the planet, and as such their services are likely an integral part of many of your IT toolboxes. So how can you manage identity and federate access in […]

The post 11 AWS Identity Management Best Practices to Live By appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>

 

 

With 30% of the global public cloud computing market share, e-Retail giant Amazon.com’s cloud computing branch, Amazon Web Services, is the most dominant cloud service provider on the planet, and as such their services are likely an integral part of many of your IT toolboxes. So how can you manage identity and federate access in your AWS cloud?

Last week we shared Erik Paulsson’s tips on using AWS’s build in IAM services, and now we’re back with more: 11 IAM Best Practices to Live By, brought to you by the AWS Identity and access team themselves.

The session covers AWS Identity and Access Management (IAM) best practices that help improve your security posture. AWS IAM experts explain how to manage users and their security credentials and go over why you should delete your root access keys—or at the very least, rotate them regularly. Using common use cases, Amazon’s experts demonstrate when to choose between using IAM users and IAM roles and explore how to set permissions to grant least privilege access control in one or more of your AWS accounts.

 

The post 11 AWS Identity Management Best Practices to Live By appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
Identity Access Management 101, A Presentation https://solutionsreview.com/identity-management/identity-access-management-101-slideshare/ Wed, 04 Oct 2017 17:15:55 +0000 https://solutionsreview.com/identity-management/?p=1194 Identity is the new Enterprise security perimeter. It’s one of the hottest, most important areas in information security today, and it’s also one of the fastest going business segments in IT—but it can also be one of the most confusing. As technology improves, the volume of terminology around it increases—there’s a seemingly endless torrent of […]

The post Identity Access Management 101, A Presentation appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>

 

 

Identity is the new Enterprise security perimeter. It’s one of the hottest, most important areas in information security today, and it’s also one of the fastest going business segments in IT—but it can also be one of the most confusing.

As technology improves, the volume of terminology around it increases—there’s a seemingly endless torrent of new terminology surrounding Identity Management, and the acronyms just keep piling up—IAM, IDM, PIM, PAM, SIEM, RBAC, SSO,—the list goes on and on. Worst of all, if can be difficult to find an explanation that doesn’t reference another half dozen ciphered terms.

If you are an executive or IT leader challenged with understanding the complex world of identity management, you are not alone.

Luckily, the good folks at OneLogin have  created a presentation that helps explain  some key identity concepts with examples.

OneLogin’s presentation covers:

• Trends in cloud, and the standards to support them
• State of Identity, Digital Trust, Authentication and Access
• Directory Services and Federation
• SSO (Desktop SSO, Web SSO, and Mobile SSO)
• Automating Onboarding Practices, Provisioning and Deprovisioning

This is one of the best basic explanations of Identity Management on the net, so sit back and enjoy this 28-slide presentation, and check out the full on-demand webinar here.

Also, if you need any more explaining check out our Identity Management glossary and our 2017 IAM Buyer’s Guide. 

The post Identity Access Management 101, A Presentation appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
Contextual Access Management Explained in 2 Minutes https://solutionsreview.com/identity-management/contextual-access-management-explained-in-2-minutes/ Thu, 27 Jul 2017 18:00:25 +0000 https://solutionsreview.com/identity-management/?p=1332 This probably sounds familiar: “Access Management technology is unable to handle modern networks.” The idea is nothing new, but it’s been getting a lot of airtime, as data breach after data breach result from clumsy workplace access management. Now, many are saying that even Role-based Access Control (RBAC) isn’t enough to account for the countless […]

The post Contextual Access Management Explained in 2 Minutes appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>

This probably sounds familiar: “Access Management technology is unable to handle modern networks.” The idea is nothing new, but it’s been getting a lot of airtime, as data breach after data breach result from clumsy workplace access management. Now, many are saying that even Role-based Access Control (RBAC) isn’t enough to account for the countless devices, environments, and circumstances of the modern workplace. According to some critics, the answer to these problems is Contextual Access Management. But what exactly does that mean?

In this brief video, clocking in at just over two minutes, experts from Nova Coast, a security and compliance services company, explain what contextual access management is, and how it can be used to alleviate the growing pains of Identity Management in the modern workplace.

Want more on Access Managment? Check out these resources:

The post Contextual Access Management Explained in 2 Minutes appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
IAM Complicated: Why You Need to Know About Identity and Access Management, BSides Nashville https://solutionsreview.com/identity-management/iam-complicated-why-you-need-to-know-about-identity-and-access-management-bsides-nashville/ Thu, 29 Jun 2017 16:43:42 +0000 https://solutionsreview.com/identity-management/?p=1429 Do you know where identities are born? How can you tell what an identity can and can’t do? What do you do when you realize your refrigerator has an identity of its own? If your IPS blocks your refrigerator you may lose access to your pizza. Identity and Access Management is what connects the identities, […]

The post IAM Complicated: Why You Need to Know About Identity and Access Management, BSides Nashville appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>

Do you know where identities are born? How can you tell what an identity can and can’t do? What do you do when you realize your refrigerator has an identity of its own? If your IPS blocks your refrigerator you may lose access to your pizza. Identity and Access Management is what connects the identities, accounts, entitlements, roles, permissions, and resources to provide correct access control. All areas of security are dependent on IAM and need to understand how to take advantage of it. This talk will explore the IAM lifecycle showing how to protect it and wreck it along the way.

If your IPS blocks your refrigerator you may lose access to your pizza.

Identity and Access Management is what connects the identities, accounts, entitlements, roles, permissions, and resources to provide correct access control. All areas of security are dependent on IAM and need to understand how to take advantage of it. This hour-long presentation will explore the IAM lifecycle, showing how to protect it (and wreck it) along the way.

 

The post IAM Complicated: Why You Need to Know About Identity and Access Management, BSides Nashville appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
Video: Best Practices for Securing Privileged Access https://solutionsreview.com/identity-management/video-best-practices-for-securing-privileged-access/ Mon, 17 Apr 2017 15:12:15 +0000 https://solutionsreview.com/identity-management/?p=1276 It’s been proven time and time again: unmanaged, unmonitored privileged accounts are an easy target for both external attacks and malicious insiders— just take a look at some recent data breaches and chances are high the malicious party used a compromised privileged account to increase their permissions. Due to this common practice Privileged Access Management (PAM)— […]

The post Video: Best Practices for Securing Privileged Access appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
https://youtu.be/emhfCVOw9GQ

It’s been proven time and time again: unmanaged, unmonitored privileged accounts are an easy target for both external attacks and malicious insiders— just take a look at some recent data breaches and chances are high the malicious party used a compromised privileged account to increase their permissions.

Due to this common practice Privileged Access Management (PAM)— the monitoring and protection of super user accounts— has emerged as one of the most important aspects of Identity and Access Management (IAM) , and cyber security writ large, today.
But in an organization with thousands of IT assets, it can be difficult to securely manage access to privileged accounts for several reasons:

• There are thousands of privileged passwords.
• Administrator passwords exist on each device and application.
• It is difficult to coordinate changes to shared passwords.

When there are many shared, static passwords, former IT staff retain sensitive access after leaving an organization. It can also be difficult to trace changes back to individuals who made them.

In this hour-long webinar from Hitachi ID, experts discuss best practices for privileged access management to remediate these problems.


Check out these additional resources: 

 

The post Video: Best Practices for Securing Privileged Access appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
Identity Squatting: Laws, Tools and Methods for Security Professionals https://solutionsreview.com/identity-management/identity-squatting-laws-tools-and-methods-for-security-professionals/ Mon, 20 Mar 2017 15:07:39 +0000 https://solutionsreview.com/identity-management/?p=1618 In the modern world, there are a thousand reasons to become someone else. Hacking, spying corporate espionage.. even just borrowing credentials to access business files.How far can a person go in creating alternative identities or borrowing identities of others? Security professions need to know, “who are you really?” We live in a world of avatars, […]

The post Identity Squatting: Laws, Tools and Methods for Security Professionals appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>
In the modern world, there are a thousand reasons to become someone else. Hacking, spying corporate espionage.. even just borrowing credentials to access business files.How far can a person go in creating alternative identities or borrowing identities of others?

Security professions need to know, “who are you really?” We live in a world of avatars, Internet persona, stage names and identity theft. Authenticating people becomes harder every day.

In this 40-minute presentation Ted Claypoole, Partner at Womble Carlyle will explore the laws and regulations addressing identity, and examine which types of impersonation and identity shifts are legal and which can land you in jail.

The post Identity Squatting: Laws, Tools and Methods for Security Professionals appeared first on Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, & Services.

]]>