Seminars @

IDM uk

Identity Management

8 November 2022


Seminars @ IDM uk


Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

One platform for all


The right cloud-based directory allows you to provide users with one identity to access all of their resources, whether that be Windows, Mac, and Linux devices as well as applications and infrastructure — both on-premises and in the cloud.

With seamless integration to Microsoft 365, Google Workspace, and HRIS platforms, you can streamline onboarding and consolidate your IT management need into one solution: no extra add-ons or point tools.

Join us to hear more about how you can establish a unified approach to your cloud-based directory management.

Are you remote work ready?


By using a cloud admin portal, you can securely manage employees regardless of whether they’re in office or working remotely.

Hyper secure authentication protocols and device-based agents transmit authentication, policies, and other management information without the need for VPN. This, in tandem with MDM to roll out devices to remote employees using zero touch deployment, means you can successfully pivot towards being a truly secure virtualised enterprise.

Zero Trust Security


We can provide granular access control based on trusted identities, networks and devices, enforce or relax MFA based on trust context to ensure security while making end user interactions as frictionless as possible, and maintain keen visibility over all transactions including identity events and authentications through Directory Insights.

Join us as we address how to implement this key zero-trust approach to identity management.

Machine-to-machine: simplify communication between API’s and trusted services


We address, how to enable secure access to your API from other internal or external non-interactive third-party apps with minimal configuration.

Join us to hear more about how to allow non-interactive applications such as app servers, CLI’s, daemons, and others to consume your API safely and securely in cases where no human interaction is necessary.

Adaptive MFA: secure your business, users and customers


The average data breach costs companies US $3.86 million. You can’t afford to lose intellectual property if your employees get hacked and you can’t afford to lose customers if your users get hacked.

Secure your accounts and apps with a strong multi-factor authentication solution that will keep the right people in and the wrong people out. Protect all your resources, including customer-facing apps and enterprise apps that store your most sensitive data.

We address:

  • Cloud-to-ground protection
  • Proactive security
  • Integrated security

Modernize Legacy IAM: Increase operational efficiency and pave the way for Zero Trust architecture


The global health crisis showed us how quickly business can transform. It also magnified the cracks in outdated identity and access management (IAM) systems. As technology projects were accelerated, the limitations of legacy IAM were impossible to ignore. When you modernize IAM, you gain the operational agility you need to unleash digital transformation, while paving the way for a future-proof Zero Trust architecture. With out-of-the-box migration tools, you can take identity to the cloud and consolidate IAM on your timeline.

We address, how legacy IAM is holding you back, why you don’t need to stretch legacy IAM to breaking point, and instead choose to better support your business needs.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Authentication v Authorisation
Authentication. Authorization. It’s all just logging in right? Are they essentially the same thing? Although some may use the terms interchangeably, they are actually very different concepts and understanding how they differ is important for anyone in the security space. In the most simplistic terms, authentication is the process of ensuring the user is who...
Introducing Code Commit Signing to Secure Your SDLC
In today’s model of distributed software in the cloud, engineering teams are developing, building, and delivering all the time. Plus, with continuous integration and continuous delivery (CI/CD) pipelines, there are no stopping points for manual security checks. Once the entire build is complete, it’s even more difficult, time-consuming, and resource-intensive to check the entire build...
The history and future of passwords
The inception of passwords in the 1960s changed the digital world as we know it. Passwords are now an unconscious standard practice in the lives of most, and from your first pet to the street you grew up on, they are deeply ingrained in our minds. The first passwords introduced the concept of authentication to cybersecurity, or...