For the best web experience, please use IE11+, Chrome, Firefox, or Safari

A Unified Approach to Identity Security

Mixing and matching cybersecurity tools from different vendors can create a fragmented IAM infrastructure laden with exposure gaps. But the ‘one threat, one tool’ model can only be met if your security platform reaches all parts of your identity landscape – from Active Directory to the cloud apps, from 2FA to PAM and governance.  

One Identity has the single most complete identity platform on the market. KuppingerCole states, “[One Identity] is one of the few vendors that covers all major areas with their own solutions.”  

Learn how One Identity can help you: 
  • Start with any piece of the IAM puzzle to build up a unified identity platform customized to you 
  • Utilize varied deployment models, whether SaaS, hybrid, on-premises or private cloud 
  • Get more efficient support, faster time-to-value and a pre-validated, pre-integrated portfolio 
  • Level-up your workforce’s skill set with a single vendor stack 
Join industry experts in each of the following webinars to learn how to unify your identity security.




Select your events


Online

Dec.

17

Time: 11:00 AM EST
Location: Microsoft Teams Live

Syslog-ng is a high-performance platform for log management, and it has powerful tools to optimize it for your specific use case and maximize throughput.

Join One Identity systems engineer Craig Finnan in this technical guidance webcast to learn the best settings for unblocking the most common syslog-ng bottlenecks. Not only will you get to explore the key terms and see how each setting can affect performance, but you will also be able to: 

  • Adjust syslog-ng parameters for maximum deployment output  
  • Gain a pre-flight checklist to find potential bottlenecks 
  • Understand performance potential in syslog-ng 
  • Participate in a Q&A at the end of the webcast – bring your questions! 

On Demand

Dec.

4

The very identities that hackers abuse can be hardened against account takeover with identity as a service (IDaaS) solutions like OneLogin.  

Turn your identities into the first line of defense with key insights from One Identity Solution Engineer Solenne Le Guernic.

Stream this presentation, complete with OneLogin demos, to learn how IDaaS solutions can help you: 

  • Gain visibility into privilege and access management 
  • Solve usability problems with passwordless authentication 
  • Automate risk detection 
  • Simplify permissions control with a consolidated dashboard 
  • And more 

 

On Demand

Dec.

3

If only you could integrate Privileged Access Management (PAM) with identity governance, you could mitigate the consistent policy enforcement challenges, provisioning and audit inefficiencies, and compliance struggles stemming from lack of centralized visibility into privileged activities.  

One Identity is here to help with its integration solution, Privileged Access Governance (PAG). 

Join industry experts for insights into how PAG can enhance your security posture, and discover ways this integration can help you: 

  • Centralize and automate policy enforcement and audit trails with PAG and Safeguard 
  • Reduce risk, and simplify compliance with policy-driven identity lifecycle management 
  • Ensure consistent governance and access control across all systems 
  • And more 

Plus, get a live demonstration of real-world application of the PAG and Safeguard combination.  

Speakers: 

  • Jason Moody, Product Marketing Consultant, One Identity 
  • Greg Manderfeld, IGA Solution Architect, One Identity 

  

On Demand

Nov.

21

Local accounts are a treasure trove for cybercriminals, so managing them, especially in today’s complex IT environment, is vital. But conventional tools like Microsoft’s Local Administrator Password Solution (LAPS) don’t always offer the flexibility and security depth required for multi-platform ecosystems.  

But One Identity Safeguard can level up your credential management, especially when paired with Connect for Safeguard Assets.  

Want to replace LAPS with an integrated approach to credential management?

Stream this in-demand webinar to learn how these solutions can help you: 

  • Get seamless credential rotation across Windows, macOS and Linux systems 
  • Assign unique passwords to each system account 
  • Eliminate the risk associated with shared or reused credentials 
  • Boost security and operational efficiency 

Speaker: Jake McCabe

Jake McCabe is a Solutions Engineer with One Identity focusing on privileged access management. He joined the company in 2022 and has over 20 years experience in various roles helping organizations to improve their security postures.

On Demand

Oct.

22

What if there were a way to simplify and streamline object and group security and management within AD and Entra ID and give you more time to focus on other tasks? Active Roles is here to help.  

Stream this webinar to learn how Active Roles can help you: 

  • Automate policies 
  • Introduce AD attestation functionality  
  • Allow group managers to control group membership 
  • Enable periodic group membership validation 

On Demand

Oct.

3

Though log management is a formidable instrument in cybersecurity, in the IAM world, event logs are often overlooked as just a way to hand over metadata to the cybersecurity team’s SIEMs. But knowing how to use these logs can be the key to a successful IAM strategy. The question is, what really is log management, and why is it key to the IAM space?  

Join One Identity’s Péter Czanik in this on-demand webinar to: 

  • Learn how log management, in the right hands, can transform your IAM strategy 
  • See the integration points you can use to empower your existing IAM tools 
  • View a PAM Essentials log management demo 

On Demand

Aug.

8

Authorization? Delegation? Everyone knows these are crucial aspects of digital security – but what exactly makes them so important? 

Join industry experts in this on-demand webinar to learn the pivotal relationship between authorization and delegation within the dynamics of identity management. Gain insights into various authorization models, such as role-based access control (RBAC) and attribute-based access control (ABAC) and: 

  • Examine how authorization and delegation create a balanced and flexible security framework 
  • Review best practices for different authorization models 
  • Discover effective integration strategies through delegation mechanisms 

Speakers: 

  • Alan Radford, Global IAM Strategist, One Identity 
  • Vipin Jain, Product Management - Active Roles, One Identity 

On Demand

Jul.

9

Your organization’s sensitive digital information deserves the best protection it can get, but vulnerabilities can always be exploited. And with traditional security methods like passwords and SSH keys slowly but surely becoming outdated in the face of modern cyberthreats, focus should shift to more advanced secrets-management strategies. 

Enter Safeguard, a leading solution in the realm of Privileged Access Management (PAM). Hear from security experts in this on-demand webinar to learn how Safeguard's innovative features can transform your organization's approach to secrets management and enhance overall security posture, and to: 

  • Explore the evolution from passwords and SSH keys to advanced secrets management 
  • Discover strategies to mitigate risks associated with poor password practices 
  • Learn how Safeguard features ensure secure and controlled password management 
  • And more

Speakers: 

  • Richard Hosgood - PAM Principal Engineer, One Identity
  • Jason Moody - PAM Global Product Marketing Manager, One Identity

  

On Demand

Jun.

25

In this third and final installment of a three-part webinar series, 'Unlock the Future of Identity and Access Management with OneLogin and Intragen,' experts cover specific advanced use cases.

Join this webinar to learn how you can:

  • Enhance RDP security with One Identity Cloud PAM Essentials
  • Bring your own MFA for secure B2B authentication
  • Protect SaaS admin access with PAM Essentials
  • Easily migrate from Okta to OneLogin

Panelists:

  • Stuart Sharp - VP of Product Strategy, One Identity 
  • Kalle Niemi - Business Consultant, Intragen

On Demand

Jun.

18

Managing authentication across a sprawling IT architecture can be daunting. From managing tons of end users with bad password habits to navigating a complex architecture of applications, both legacy and cloud-based, the authentication struggle is real. 

Get expert insights with One Identity’s Sr. Manager of Solution Engineering, Mark Cockbill, and Solution Engineer, Solenne Le Guernic, on how to ensure a flexible yet secure user experience.

Join this webinar to explore: 

  • The different challenges that come with complex IT architectures 
  • Strategies to help bring order to the chaos  
  • Ways to protect your organization’s applications beyond standard suites for security/flexibility 

Don’t let your complicated IT environment make adding authentication more difficult than it needs to be. 

On Demand

Jun.

18

Watch the second episode of our exclusive webinar series, 'Unlock the Future of Identity and Access Management with OneLogin and Intragen,' co-hosted by Intragen and One Identity. In this webinar, we cover specific use cases focusing on One Identity’s Identity as a Service (IDaaS) for small and medium-sized businesses and enterprises.

Showcased demos:

  • Seamless onboarding & offboarding
  • OneLogin password resets
  • Dynamic MFA options
  • Passwordless authentication in action

Panelists:

  • Kalle Niemi, Lead Business Consultant, Intragen
  • Peter Bastiaansen, Client Executive (Netherlands), Intragen

On Demand

Jun.

11

Identity is the key component in securing data, intellectual property, and the business processes that keep organisations running. Watch the first episode of our exclusive webinar series, 'Unlock the Future of Identity and Access Management with OneLogin and Intragen,' co-hosted by Intragen and One Identity, featuring OneLogin experts. Discover how the OneLogin solution can transform your organisation's Identity and Access Management (IAM) strategy through enhanced security and seamless automation.

Join us to:

  • Gain a comprehensive overview of IAM and IDaaS solutions, focusing on security and automation
  • Learn why a unified platform approach is the way forward and how access management is a crucial part of this strategy
  • Understand the importance of preparation, best practices for IAM projects and internal buy-in, and how a professional partner like Intragen can simplify the process

Panelists: 

  • Stuart Sharp - VP of Product Strategy, One Identity 
  • Kalle Niemi - Business Consultant, Intragen
  

On Demand

May

14

In a world of deep fakes and AI horror stories, are there any benefits to using AI in something as vitally important as your identity access management (IAM)?  

One Identity field strategist Robert Byrne explores the limitations and concept of ‘AI’ – does it mean what we think it means? – and investigates how AI is used in solutions like NLP and CoPilot. Stream the on-demand webcast to examine the opportunities for machine learning methods in IAM, including ways it can help you: 

  • Increase cost-effectiveness and reliability using normal Data Science Methods 
  • Detect, analyze and respond to risk across an identity ecosystem 
  • Monitor and audit the activity of privileged users with automation

On Demand

Apr.

25

Non-human identities are essential components of any organizational landscape, yet their security risks are often underestimated. Just like user accounts, they require constant surveillance and protection. 

In this webcast, experts dive into the world of non-human identities, including bots, DevOps, certificates, service accounts, API keys, machine identities and more.

Join us to: 

  • Discover the roles and vulnerabilities of non-human identities 
  • Learn why/how to safeguard these identities 
  • Gain practical insights to fortify them against evolving risks 

Speakers: 

  • Alan Radford, Global IAM Strategist, One Identity 
  • Dan Conrad, Field Strategist - NAM, One Identity
     

On Demand

Apr.

10

Cybersecurity threats bombard the workforce daily, exploiting the ease of access to your critical data. Privileged Access Management (PAM) is one of your greatest assets to mitigate risk, and One Identity Cloud PAM Essentials offers a commitment to continuous evolution, positioning it as a reliable ally for organizations striving to strengthen their cybersecurity defenses. 

In this webinar, PAM experts will: 

  • Discuss the critical importance of PAM in mitigating risks  
  • Address the challenges of complexity and limited resources facing organizations today 
  • Demonstrate how PAM Essentials can retain simplicity and user-friendliness in your organization 
  • Explore best practices for fighting cyber threats efficiently and effectively with Essentials

Speakers: 

  • Jason Moody: PAM Global Product Marketing Manager, One Identity 
  • Gabe Nichols: R&D Product Management, One Identity   
 

On Demand

Mar.

21

OneLogin's most recent product innovations in the areas of passwordless, desktop-level MFA, adaptive authentication and privilege access management (PAM) collectively address the most pressing access management challenges faced by organizations today.   

Join our webcast with OneLogin experts to learn more about how OneLogin: 

  • Empowers you to eliminate traditional password vulnerabilities 
  • Adds another layer of security to defend against unauthorized access 
  • Assesses user behavior continuously to adapt security measures in real-time  
  • Enforces access controls for critical resources and ensures compliance 

Together, these capabilities not only fortify against evolving cyber threats but also streamline user experiences. In this webcast, our OneLogin team will provide more details about these product innovations, discuss the benefits that they bring to organizations like yours and run some exciting demos to showcase how they work.  

Speakers: 

  • Stuart Sharp - One Identity VP of Product Strategy 
  • Mark Cockbill - One Identity Sr. Manager of Solution Engineering (EMEA) 
  • Sean Robinson - Senior Solutions Engineer (North America) 
  • Solenne Le Guernic - Solutions Engineer (EMEA)

On Demand

Mar.

12

Amidst the groundbreaking impact of DevOps practices on software development, challenges in aligning security measures—especially in privileged access management—have surfaced. This webcast delves into the critical need for seamlessly integrating DevOps methodologies with Privileged Access Management (PAM). 

In this webcast, software development experts explore strategies that emphasize enhanced security, efficiency and collaboration without disrupting the DevOps workflow. Learn how this approach: 

  • Embraces existing vaulting technologies, offering flexibility and eliminating the need for proprietary solutions, aligning security with dev team preferences 
  • Advocates for unified collaboration between security and dev teams, embedding security into the DevOps process from inception 

Learn the importance of prioritizing security without impeding productivity and gain actionable insights to help your organization bridge the divide between DevOps and PAM. 

Speakers: 

  • Rich Hosgood: One Identity PAM Principal Pre-Sales Engineer
  • Jason Moody: One Identity Global Product Marketing Manager 
 

On Demand

Feb.

14

Identity and Access Management (IAM) is a vital component of any cyber security strategy, enabling organizations to regulate and oversee access to their data, systems and resources. But IAM isn’t just a technical solution – it’s a catalyst for business advancement and a crucial shield against risk. 

In this webinar, discover how IAM helps organizations reduce cyber risks, meet regulatory requirements, align with corporate risk management objectives, and influence cyber insurance decisions and premiums.

Experts will explore: 

  • What IAM is and why it’s important for cyber security 
  • How IAM can affect cyber insurance policies and costs 
  • What the key elements and challenges of a successful IAM program are 

Speakers: 

  • Larry J. Chinski, Vice President, Global IAM Strategy | One Identity 
  • Stacey Blanchard, Global Vice President of Professional Services | One Identity 

On Demand

Feb.

6

In an era of distributed and pervasive digital connectivity, cyber threats pose significant physical, financial and reputational risks. Malicious actors are increasingly exploiting identity-focused vulnerabilities and threat vectors to breach our traditional defenses.  

In this webinar, an expert panel explores the identity risk landscape. Join them as they: 

  • Uncover proactive strategies for safeguarding against threats 
  • Dive into the evolving nature of identity challenges 
  • Explore strategies for risk prevention, detection and mitigation  

Enhance your understanding of identity security and gain expert insights to help you develop a resilient identity framework for the digital age. 

Speakers:  

  • Jason Revill - Global leader for Avanade's Identity and Access Management and Data Protection Practice. 

  • Robert Byrne - Field Strategist, EMEA | One Identity 

  • Ted Ernst - Senior Product Manager | One Identity
  

Select one or more relevant webcast(s) you wish to attend before you register.

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.