Overview

Join us to learn more about:

  • Where identity fits in the plethora of IT solutions and the risks posed by inadequate controls.
  • Key solutions that help address the challenge of not only the weakness of passwords but also the burden of management.
  • Why it’s important to think about identity holistically and not on a service by service basis?
  • SSO, MFA, RADIUS, SAML, 2FA, API, PAM, TACACS — how each plays its part.
  • How do we lock all those doors such that we keep the bad guys at bay, yet allow our users the convenience of access to crucial resources?