Authenticate, Administer, Authorize, and Audit with Ping Identity

Transcript

Related insights

Webinar

Achieving a Frictionless, Secure, and Passwordless User Authentication and Authorization Experience

Explore strategies for delivering secure, passwordless authentication and authorization while keeping the user experience frictionless. This on-demand session shares practical approaches and IAM best practices for balancing usability with robust identity protection.
Webinar

All Access is Privileged – Taking a PAM-First Approach Towards your Identity Security Program

Holistic identity security starts by treating all access as privileged and protecting sensitive data—no matter the role. A PAM-first approach defends against threats and enforces security for every user, not just IT admins.
Webinar

Creating Transformative Identity Governance Solutions with Microsoft Entra Suite

HorizonID extends Microsoft Entra ID Governance by resolving legacy integration challenges and simplifying complex identity workflows. This webinar highlights how HorizonID accelerates identity modernization, improves data reconciliation, and helps organizations fully leverage their Microsoft Entra investment.
Webinar

Who Gives a Sh*t About Identity Security – How to Create Business Value from IAM

Identity and Access Management (IAM) programs create business value by streamlining secure user access, reducing risks such as credential theft, and improving operational efficiency across departments. By defining common business outcomes and building leadership support, organizations can protect budgets, foster program champions, and leverage AI to enhance IAM’s impact on HR, marketing, and other teams, driving meaningful organizational transformation.
Webinar

How to Bolster Security and Create Business Value Through Third-Party IAM

Extending Identity and Access Management (IAM) to third parties and non-employees enhances security while unlocking business value through streamlined vendor lifecycle, delegated administration, and relationship management. Learn strategies to address governance, audit requirements, and stakeholder engagement for a successful third-party IAM program.
Webinar

Migrating from MIM Sync: User Provisioning with Microsoft Entra ID

Migrate user provisioning from Microsoft Identity Manager (MIM) Sync to Microsoft Entra ID for a secure, scalable, and cloud-native identity management solution. This webinar covers migration strategies, automation using SCIM and HR-driven provisioning, auditing capabilities, and best practices for seamless user lifecycle management across hybrid and cloud environments.
Webinar

Transitioning from the MIM Portal to Microsoft Entra ID: MIM Retirement Series Part 2

Modernize your identity strategy by transitioning from the Microsoft Identity Manager (MIM) Portal to Microsoft Entra ID while maintaining existing on-premises synchronization with the MIM sync engine. This webinar explores how to leverage Entra ID’s advanced self-service, automated workflows, and governance capabilities without disrupting hybrid environments, featuring practical guidance and real-world migration examples.
Webinar

Moving from MIM to Microsoft Entra ID Governance to Future Proof Identity Management

Transition from Microsoft Identity Manager (MIM) to Microsoft Entra ID Governance to enhance security, streamline identity processes, and future-proof your identity management strategy. This webinar details key benefits, customer experiences, and practical migration guidance to help organizations modernize IAM with a scalable and cloud-native governance solution.
Webinar

From SailPoint IdentityIQ to Identity Security Cloud: Creating Value with Cloud

Migrating from SailPoint IdentityIQ to Identity Security Cloud (ISC) offers significant benefits including reduced total cost of ownership, faster deployment, continuous updates with no downtime, and AI-driven security insights. This migration leverages existing investments while enabling scalable, cloud-native identity security that enhances visibility, risk detection, and operational efficiency.
Webinar

Machine Identities: Uncovering the Hidden Risks in your Environment

Uncover the hidden risks posed by machine identities in your IT environment and learn strategies to manage their security effectively. This webinar dives into the challenges of discovering, governing, and protecting machine identities to reduce attack surfaces and prevent unauthorized access in modern enterprises.
Webinar

Navigating the Future of Identity: 2024 Year End Review & Top Predictions for 2025

Explore the most impactful advances in Identity Access Management (IAM), governance, and security from 2024, and prepare for the top five identity management trends shaping 2025. This webinar delivers expert insights on overcoming challenges, enhancing compliance, and leveraging emerging technologies like AI to future-proof your organization's identity strategy.
Webinar

Discover the Microsoft Entra Suite: Unlocking Unified Identity and Access Management

Microsoft Entra Suite offers a unified, advanced solution for managing identity and access, ensuring secure access to critical systems while protecting sensitive data and ensuring compliance. This webinar covers tailored identity workflows for new hires, role changes, and exits, fraud prevention through identity proofing, secure hybrid work scenarios, and integration with platforms like Epic and Workday.
Webinar

Modernizing GRC: How to Mitigate Risk in Hybrid Cloud Environments

Modernize your Governance, Risk, and Compliance (GRC) strategy to effectively mitigate risk in hybrid cloud environments across multiple ERP systems like Oracle, SAP, and Microsoft Dynamics. This on-demand webinar explores market trends, SoD risk management, converged IGA and GRC platforms, and the use of AI to enhance audit efficiency and reduce compliance gaps.
Webinar

Securing Academic Partnerships: Overcoming Identity Challenges in Collaborative Higher Education Environments

Secure seamless collaboration across universities and research partners by addressing identity challenges in higher education environments. This webinar explores strategies to protect sensitive data, manage diverse access systems, ensure compliance, and support scalable, secure academic partnerships using modern identity solutions.
Webinar

Control your Cloud: Mastering Least Privilege with CIEM

Cloud Infrastructure Entitlement Management (CIEM) helps establish and maintain least privilege across multi-cloud environments by providing centralized visibility and control over cloud entitlements. This webinar covers CIEM best practices, security framework standardization, entitlement cleanup with analytics, and how CIEM lays the foundation for posture management and DevSecOps.
Webinar

Exploring Microsoft's Security Service Edge (SSE) Solution

Microsoft’s Security Service Edge (SSE) delivers unified, cloud-based security by integrating identity-aware network access, Zero Trust Network Access, Secure Web Gateway, and Cloud Access Security Broker capabilities. It replaces legacy VPNs with seamless, secure global access while eliminating security gaps and simplifying access control management for modern distributed workforces.

Authenticate, Administer, Authorize, and Audit with Ping Identity

January 26, 2024
|
Duration:
50 mins
About This Talk

Transcript

Speakers
No items found.

Related insights

Identicast

Ep. 5 – Identity Threat Detection & Remediation with Hydden

We chat with Tyler Croak of Hydden.io to discuss improving security posture through Identity Threat Detection & Remediation.
Identicast

Ep. 3 – The Convergence of App Governance and Identity Security with Delinea

We discuss the convergence of application governance and identity security with Frank Vukovits of Delinea.
Identicast

Ep. 2 – Dynamic Cloud PAM with Britive

We discuss DynamiWe talk Cloud Privileged Access Management with Nauman Mustafa of Britive.
Identicast

Ep. 1 – SDLC Governance with BlueFlag Security

We interview Rajiv Srinivasan of BlueFlag Security, an emerging player in the SDLC governance space.

Authenticate, Administer, Authorize, and Audit with Ping Identity

January 26, 2024
|
Duration:
Intro

Recent insights

Success Story

Recovering a CyberArk Implementation for a Healthcare FinTech Leader

Learn how MajorKey helped a healthcare technology company overcome a stalled CyberArk implementation to achieve full PAM adoption.
Success Story

Transforming Privileged Access Management with CyberArk

Modernizing privileged access management for a public sector technology team
Success Story

Helping a Multinational Insurance Company Implement Saviynt

MajorKey successfully implemented Saviynt for a multinational insurance company, supporting the adoption of an IGA program built on best practices. Their approach streamlined identity lifecycle management, improved compliance, and reduced operational risks while maximizing the client’s Saviynt investment.
Success Story

Top Ranked Children's Hospital Automates New User Processing - Saving 2,600 Hours Provisioning New Users Annually

The MajorKey team fully automated the user creation process with SailPoint IdentityIQ, saving 2,600-man hours annually while reducing security risks.
Success Story

From Three Days to Three Minutes: Accelerating New User Onboarding at a Major US Municipal Hospital System

MajorKey accelerated user onboarding and offboarding at a major US municipal hospital system from days to minutes by fully automating the processes. This transformation improved operational efficiency, enhanced security by reducing risk exposure, and enabled the healthcare organization to scale identity access management with confidence.
Success Story

Helping a Fortune 500 Bank Get SailPoint Back on Track

MajorKey rescued a stalled SailPoint implementation at a Fortune 500 bank after two previous integrators failed to deliver, resolving key configuration issues and streamlining application onboarding. Their program-level approach enabled onboarding hundreds of applications simultaneously, saving significant time and resources while restoring client confidence.
Success Story

Saying Goodbye to ADFS: Migrating a Federal Agency to Microsoft Entra ID for a Zero Trust, Cloud-First Future

Oxford Computer Group, a MajorKey Technologies Company, helped a large federal agency migrate from ADFS to Microsoft Entra ID to improve security and streamline authentication processes.
Success Story

Advising and Implementing Governance to Help Customer Go Public

MajorKey helped a global food and beverage manufacturer establish Application Governance controls to meet SOX requirements in order to go public.
Success Story

Guiding a Global Heavy Equipment Manufacturer Through IGA Modernization

MajorKey fast-tracked the vendor selection and implementation process to modernize a global heavy equipment manufacturer’s identity and application governance program. Their work streamlined SAP security controls, automated access requests, and enabled zero-day user starts, helping the client achieve compliance, reduce risks, and improve operational efficiency.
Success Story

A Modern, Scalable IGA Solution for a Large Healthcare Network

Migrating to Microsoft Entra ID Governance to consolidate identity and security solutions for reduced risk and streamlined processes.
Success Story

Consolidating Identity Processes, Improving Security, and Reducing Costs with Microsoft Entra ID Governance

For healthcare organizations, Microsoft Entra ID Governance provides an opportunity to consolidate identity management processes, improve security, and reduce IT infrastructure costs.
Success Story

Online restaurant-reservation service gains cloud visibility and a least-privilege identity strategy

Over-privileged accounts and lack of visibility lead to increased security risk and possible increased cloud costs.
Success Story

Retailer Updates Separation of Duty Rulesets to Maintain SOX Compliance

MajorKey updated the client's FastPath instance to help them pass SOX audit and find maximum value following changes to their internal business processes.
Success Story

Helping Community Colleges Improve Security with Microsoft 365 Security Services

Enabling robust and evolving security solutions with Microsoft Entra ID and Microsoft 365 Security Services for a large network of community colleges.
Success Story

Supply Chain Company Mitigates Risk Exposure and Reduces Process Time by Automating User Non-Starts Instantly

The customer was experiencing significant inefficiencies around governing user non-starts. Due to the manual nature of their process, every non-start would take several days to complete.
Success Story

Rescuing Stalled FastPath Deployment at a Food & Beverage Manufacturer

The client was running into issues with their FastPath implementation partner and struggling to make progress until MajorKey got it over the finish line.
Redirection linkRedirection linkRedirection link
Ping Identity
No items found.
No items found.