Para obter uma melhor experiência web, utilize o IE11+, Chrome, Firefox ou Safari.

One Identity Resilience On Demand: Technical Deep Dives

If you missed One Identity Resilience 2021 or attended but missed some Technical Deep Dive presentations - or just learned about this global identity security event – here’s all the available sessions to view at your convenience. Happy learning. 

Selecione seus eventos


Sob demanda

Nov.

3

In this session you will learn how to use scripting to achieve better business outcomes. This session will provide an overview of the scripting capabilities within Active Roles and walk you through creating scripts in a variety of scenarios.

Sob demanda

Nov.

3

Finally, it is not necessary to have an Active Directory on-premises any longer if you want to work with Active Roles. Watch this session to learn how to deploy Active Roles with Microsoft Azure in different scenarios.

Sob demanda

Nov.

3

But Active Roles 7.4.4 goes beyond Microsoft and many more Cloud applications can be provisioned via Active Roles. Check out how to leverage Starling Connect with its more than 57 connected Cloud applications improve security. Last but not least you will see how to connect to other Cloud applications using the new SCIM v2 in-bound/out-bound synchronization in Active Roles.

Sob demanda

Nov.

2

Learn how to work with Identity Manager on Demand. Learn about the value, techniques, the process and hear from a partner with hands-on experience.

Sob demanda

Nov.

2

Cloud Infrastructure Entitlement Management is not really a new topic, but has become one of the top areas where customers should look at, positioned in IGA as well as in the PAM area. Have a sneak-peak at how you will be able to secure Cloud infrastructures in the future focusing here at Identity Manager.

Sob demanda

Nov.

2

Service Now is one of the prevailing ITSM solutions worldwide. It is not just another target system in Identity Manager. Ticket creation and Service catalog integration plays an important role as well to support processes and thus enterprise security. Learn about the capabilities of the new target system module and the capabilities in Identity Manager.

Sob demanda

Nov.

2

Starling Connect is a SaaS offering that enables any management system supporting SCIM, e.g. Identity Manager or Actives Roles to connect to more than 57 Cloud applications.

Sob demanda

Nov.

2

Identity Manager 8.2 includes redesigned web applications based on the Angular framework, both for end users and administrators. This session gives a technical overview of the architecture and its components. We will walk through different customization models and take a look at how to build API extensions and Angular plugins. With customization capabilities being a key element to the success of IAM projects, we'll also address the question of the tools and processes required to integrate customization into the development lifecycle.

Presenter: Hanno Bunjes, Team Lead, One Identity

Sob demanda

Nov.

2

This session reveals the latest news on progress and planning for the upcoming iteration of Safeguard on Demand and includes a demo of functionality currently in development.

Presenter: Dan Peterson, Software Architect, One Identity

Sob demanda

Nov.

2

In this session you'll learn how you can deliver safe and secure privilege access without the hassles and overhead of a VPN - a browser is all you need.

Presenter: Holger Weihe, PAM Principal, One Identity

Sob demanda

Nov.

3

Learn how you can seamlessly integrate Azure AD and other cloud applications with Safeguard for Privileged Passwords using Starling Connect for Cloud. This enables the discovery and management of accounts stored in cloud based applications by Safeguard for Privileged Passwords, supporting rotating passwords and providing additional security.

Sob demanda

Nov.

3

Learn how you can integrate audit information generated by Safeguard for Sudo into the privileged analytics engine of Safeguard for Privileged Sessions and perform free-text search across recorded sessions.

Sob demanda

Nov.

3

See how you can bring the advantages of session monitoring, credential vaulting, and analytics to your legacy applications. Using Azure Active Directory authentication as an example, we'll demonstrate how you can enable modern authentication techniques, such as passwordless login, alongside advanced session monitoring

Sob demanda

Nov.

3

Safeguard for Privileged Sessions provides wide protocol support. However, there are various privileged applications in use with proprietary or unique protocols, such as database clients, ERP clients, and many more. Although federated authentication is common today, it’s not applicable in all scenarios. Safeguard for Privileged Sessions is now introducing credential injection for these applications to enable the highest level of credential security.

Sob demanda

Nov.

3

Have you ever wondered what happens when you try to open a URL such as rdp:// or ssh:// and whether you could define custom handlers to take actions to launch an RDP or SSH session automatically?

Please join us while we show-case the flexibility and power of our open-sourced session launcher, SCALUS, and demonstrate how it can be used to launch privileged sessions straight from the Safeguard web portal no matter if Windows, GNU/Linux, or OS X is your platform of choice.

Sob demanda

Nov.

3

In this session you will learn how One Identity Manager’s Application Governance Module helps organizations to create or update new services and to manage applications, as well as provide a common framework to manage user entitlements and roles.

Sob demanda

Nov.

3

In this session you will learn and see what new features are upcoming in Identity Manager 8.2 regarding Azure AD, Teams, SharePoint Online, and Exchange Online

Selecione um ou mais webcast(s) que você tenha interesse em participar antes de se registrar.

Por favor, aguarde...

triangle-down check
Ao fazer o download, você se inscreverá para receber nosso e-mail marketing. Para cancelar sua inscrição, siga as etapas descritas em nossa Política de Privacidade.

reCAPTCHA protege este site. Confira a Política de Privacidade e os Termos de Uso do Google.