Seminars @

IDM uk

Identity Management

8 November 2022

Victoria Park Plaza, London

Seminars @ IDM uk


Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind.

One platform for all


The right cloud-based directory allows you to provide users with one identity to access all of their resources, whether that be Windows, Mac, and Linux devices as well as applications and infrastructure — both on-premises and in the cloud.

With seamless integration to Microsoft 365, Google Workspace, and HRIS platforms, you can streamline onboarding and consolidate your IT management need into one solution: no extra add-ons or point tools.

Join us to hear more about how you can establish a unified approach to your cloud-based directory management.

Are you remote work ready?


By using a cloud admin portal, you can securely manage employees regardless of whether they’re in office or working remotely.

Hyper secure authentication protocols and device-based agents transmit authentication, policies, and other management information without the need for VPN. This, in tandem with MDM to roll out devices to remote employees using zero touch deployment, means you can successfully pivot towards being a truly secure virtualised enterprise.

Zero Trust Security


We can provide granular access control based on trusted identities, networks and devices, enforce or relax MFA based on trust context to ensure security while making end user interactions as frictionless as possible, and maintain keen visibility over all transactions including identity events and authentications through Directory Insights.

Join us as we address how to implement this key zero-trust approach to identity management.

Machine-to-machine: simplify communication between API’s and trusted services


We address, how to enable secure access to your API from other internal or external non-interactive third-party apps with minimal configuration.

Join us to hear more about how to allow non-interactive applications such as app servers, CLI’s, daemons, and others to consume your API safely and securely in cases where no human interaction is necessary.

Adaptive MFA: secure your business, users and customers


The average data breach costs companies US $3.86 million. You can’t afford to lose intellectual property if your employees get hacked and you can’t afford to lose customers if your users get hacked.

Secure your accounts and apps with a strong multi-factor authentication solution that will keep the right people in and the wrong people out. Protect all your resources, including customer-facing apps and enterprise apps that store your most sensitive data.

We address:

  • Cloud-to-ground protection
  • Proactive security
  • Integrated security

Modernize Legacy IAM: Increase operational efficiency and pave the way for Zero Trust architecture


The global health crisis showed us how quickly business can transform. It also magnified the cracks in outdated identity and access management (IAM) systems. As technology projects were accelerated, the limitations of legacy IAM were impossible to ignore. When you modernize IAM, you gain the operational agility you need to unleash digital transformation, while paving the way for a future-proof Zero Trust architecture. With out-of-the-box migration tools, you can take identity to the cloud and consolidate IAM on your timeline.

We address, how legacy IAM is holding you back, why you don’t need to stretch legacy IAM to breaking point, and instead choose to better support your business needs.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Passwords are the problem!
By Frederic Klat | OneWelcome For companies in regulated industries, offering a flawless online experience for your customers is more important than ever. Once a customer sets up an account on your site, you must do everything you can to make sure they can easily access their information. It all starts with a smooth yet...
Sneak Preview of Omada at IDM UK
Blog by: Craig Ramsay | Omada Next week, we will be at IDM UK, speaking with attendees about what modern Identity Governance and Administration (IGA) means to us, and why more and more organizations are choosing to deploy IGA as a Service. The IDM event has a great agenda, and we are slotted to speak...
IAM workflows and how they benefit you
Blog By: Sidsel Loyche | neweratech To be effective, an IAM solution must faithfully model an organisation’s people, policies and processes. ​What does this look like for your organisation? A modern IAM solution achieves this using workflows. These manage your users’ identity lifecycles; provisions and deprovisions their access to the ever-growing list of IT resources; as well...