The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%). This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn: - What are the major attack vectors for cyber attacks - Which access management technologies organizations are deploying to secure access to the cloud - Which access management technologies IT professionals deem the most effective in securing access to the cloud - The criteria IT professionals use to determine access policies for users - Who are the internal stakeholders involved in Access Management deployments


12:00 - 13:00 hs GMT+1


Thales - Cloud Protection & Licensing (EMEA)
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 838 webinars
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020