Para tener la mejor experiencia web, use IE11+, Chrome, Firefox o Safari.

One Identity Resilience On Demand: Technical Deep Dives

If you missed One Identity Resilience 2021 or attended but missed some Technical Deep Dive presentations - or just learned about this global identity security event – here’s all the available sessions to view at your convenience. Happy learning. 

Seleccionar sus eventos


A pedido

Nov.

3

In this session you will learn how to use scripting to achieve better business outcomes. This session will provide an overview of the scripting capabilities within Active Roles and walk you through creating scripts in a variety of scenarios.

A pedido

Nov.

3

Finally, it is not necessary to have an Active Directory on-premises any longer if you want to work with Active Roles. Watch this session to learn how to deploy Active Roles with Microsoft Azure in different scenarios.

A pedido

Nov.

3

But Active Roles 7.4.4 goes beyond Microsoft and many more Cloud applications can be provisioned via Active Roles. Check out how to leverage Starling Connect with its more than 57 connected Cloud applications improve security. Last but not least you will see how to connect to other Cloud applications using the new SCIM v2 in-bound/out-bound synchronization in Active Roles.

A pedido

Nov.

2

Learn how to work with Identity Manager on Demand. Learn about the value, techniques, the process and hear from a partner with hands-on experience.

A pedido

Nov.

2

Cloud Infrastructure Entitlement Management is not really a new topic, but has become one of the top areas where customers should look at, positioned in IGA as well as in the PAM area. Have a sneak-peak at how you will be able to secure Cloud infrastructures in the future focusing here at Identity Manager.

A pedido

Nov.

2

Service Now is one of the prevailing ITSM solutions worldwide. It is not just another target system in Identity Manager. Ticket creation and Service catalog integration plays an important role as well to support processes and thus enterprise security. Learn about the capabilities of the new target system module and the capabilities in Identity Manager.

A pedido

Nov.

2

Starling Connect is a SaaS offering that enables any management system supporting SCIM, e.g. Identity Manager or Actives Roles to connect to more than 57 Cloud applications.

A pedido

Nov.

2

Identity Manager 8.2 includes redesigned web applications based on the Angular framework, both for end users and administrators. This session gives a technical overview of the architecture and its components. We will walk through different customization models and take a look at how to build API extensions and Angular plugins. With customization capabilities being a key element to the success of IAM projects, we'll also address the question of the tools and processes required to integrate customization into the development lifecycle.

Presenter: Hanno Bunjes, Team Lead, One Identity

A pedido

Nov.

2

This session reveals the latest news on progress and planning for the upcoming iteration of Safeguard on Demand and includes a demo of functionality currently in development.

Presenter: Dan Peterson, Software Architect, One Identity

A pedido

Nov.

2

In this session you'll learn how you can deliver safe and secure privilege access without the hassles and overhead of a VPN - a browser is all you need.

Presenter: Holger Weihe, PAM Principal, One Identity

A pedido

Nov.

3

Learn how you can seamlessly integrate Azure AD and other cloud applications with Safeguard for Privileged Passwords using Starling Connect for Cloud. This enables the discovery and management of accounts stored in cloud based applications by Safeguard for Privileged Passwords, supporting rotating passwords and providing additional security.

A pedido

Nov.

3

Learn how you can integrate audit information generated by Safeguard for Sudo into the privileged analytics engine of Safeguard for Privileged Sessions and perform free-text search across recorded sessions.

A pedido

Nov.

3

See how you can bring the advantages of session monitoring, credential vaulting, and analytics to your legacy applications. Using Azure Active Directory authentication as an example, we'll demonstrate how you can enable modern authentication techniques, such as passwordless login, alongside advanced session monitoring

A pedido

Nov.

3

Safeguard for Privileged Sessions provides wide protocol support. However, there are various privileged applications in use with proprietary or unique protocols, such as database clients, ERP clients, and many more. Although federated authentication is common today, it’s not applicable in all scenarios. Safeguard for Privileged Sessions is now introducing credential injection for these applications to enable the highest level of credential security.

A pedido

Nov.

3

Have you ever wondered what happens when you try to open a URL such as rdp:// or ssh:// and whether you could define custom handlers to take actions to launch an RDP or SSH session automatically?

Please join us while we show-case the flexibility and power of our open-sourced session launcher, SCALUS, and demonstrate how it can be used to launch privileged sessions straight from the Safeguard web portal no matter if Windows, GNU/Linux, or OS X is your platform of choice.

A pedido

Nov.

3

In this session you will learn how One Identity Manager’s Application Governance Module helps organizations to create or update new services and to manage applications, as well as provide a common framework to manage user entitlements and roles.

A pedido

Nov.

3

In this session you will learn and see what new features are upcoming in Identity Manager 8.2 regarding Azure AD, Teams, SharePoint Online, and Exchange Online

Seleccione uno o más webcasts relevantes en los que desee participar antes de registrarse.

Espere...

triangle-down check
Al realizar la descarga, se registra para recibir un correo electrónico de marketing de parte nuestra. Puede optar por no recibir ningún correo electrónico siguiendo las pasos que se detallan en nuestra Política de privacidad.

reCAPTCHA protege este sitio. Consulte la Política de privacidad de Google y los Términos de uso.