Featured

Scaling Passwordless Authentication
Chris Barngrover OpenText Cybersecurity, Dennis Robare MTIRX America Inc and Kent Purdy Opentext Cybersecurity
Today, passwordless authentication technologies are being used for more than multi-factor authentication. They are used to improve usability and resist phishing attacks while keeping friction low. Unfortunately, too often, deployment and implementation barriers prevent organizations from adopting password technologies to the level they want.
In this webinar, we will cover the following:
Considerations for selecting authentication methods and devices
Enrollment strategies for different methods
Forming a long-term strategy and set of practices for managing and maintaining your authentication environment
All episodes
-
Zero Trust Series: Boost security with Identity Powered Zero Trust
Dan Cogburn, Robert McGeary and Kevin Hansen, OpenText
Discover how Identity Powered Zero Trust helps eliminate potential threats and data breaches on Tuesday, January 24th. Zero trust is about recognizing who is trying to access and whether or not they should be able to access. During this webinar we will provide best practices for implementing Zero Trust strategies around identity and how NetIQ's holistic approach can help you better understand your overall security posture as well as:
• How to detect a compromised user account?
• How to gain more visibility, oversight, and control over your own environment?
• How to measure your security policies and whether or not they are working as they should?
• How to drastically limit the scope of your exposure to threats? -
Zero Trust Series: State of Zero Trust: Latest Insights from NetIQ
Harley Adams, Director of Product Marketing, NetIQ and Kent Purdy, Senior Product Marketing, NetIQ, OpenText
Enterprises are increasingly embracing zero trust as a necessary strategy for securing the business and proactively managing risk. Identity and privilege access management are critical first steps to zero trust, but many have not gotten further than implementing multi-factor authentication. Privilege management and identity governance are emerging as a bigger focus for organizations, but defenders are still figuring out how to stay ahead of the rapidly changing digital landscape and all its threats.
This webinar explores the results of new research commissioned by NetIQ (part of CyberRes, a Micro Focus line of business) and conducted by Dark Reading. While many organizations have enabled multi-factor authentication, research results make a strong case that they are increasingly exploring a more comprehensive approach that integrates identity management and privileges management across Zero Trust environments.
-
Zero Trust Series: 5 Customer Experiences with Data Access Governance
David Condrey, Doug Ouzts, and Buck Gashler, Data Access Governance, OpenText
Data Access Governance is a market segment that focuses on identifying and addressing threats that can come from inappropriate access to sensitive and valuable unstructured data – the file-based data that makes up 80 percent of an organization’s stored data.
NetIQ Data Access Governance is a market leader in the Data Access Governance market segment that meets the requirements of Data Access Governance, as well as delivers an extended set of additional features and benefits.David Condrey, a recognized thought leader in Data Access Governance, will detail the risks that today make Data Access Governance a necessity for securing sensitive and high-value unstructured data and then share the specifics of five organizations that deployed NetIQ Data Access Governance.
-
Scaling IGA to Cover the Whole Enterprise
Kent Purdy, Senior Product Marketing Manager, Opentext and Jim Montgomery, Identity Management Consultant, Trivir
Beyond the capabilities of NetIQ Identity Governance, a successful use of it depends on the teams involved knowing how to onboard, manage and maintain their governance environment. In this webinar, Jim Montgomery will teach attendees how to adopt governance best practices.
• Learn the concrete differences between identity synchronization and modern identity governance
• Learn deployment and onboarding best practices
• How to ensure long-term and scalable success, leveraging the IGA investment -
Make authentication as advanced as your business
Chris Barngrover, NetIQ, OpenText Cybersecurity and Jim Gerken, Novacoast, Inc.
With the ongoing expansion of multi-factor technologies to secure digital access for employees and consumers, the strong authentication market is forecast to continue its double-digit growth for at least the next five years. Add in the increasingly mainstream expectation of passwordless capabilities, and this growth will likely keep going.
In this webinar, Jim Gerken and Chris Barngrover review passwordless authentication best practices and how NetIQ enables organizations to deploy it across their environment. -
Scaling Passwordless Authentication
Chris Barngrover OpenText Cybersecurity, Dennis Robare MTIRX America Inc and Kent Purdy Opentext Cybersecurity
Today, passwordless authentication technologies are being used for more than multi-factor authentication. They are used to improve usability and resist phishing attacks while keeping friction low. Unfortunately, too often, deployment and implementation barriers prevent organizations from adopting password technologies to the level they want.
In this webinar, we will cover the following:
Considerations for selecting authentication methods and devices
Enrollment strategies for different methods
Forming a long-term strategy and set of practices for managing and maintaining your authentication environment