Emerging Trends in IAM: What's Next for Security and Identity Management?
Identity management solution providers, authentication technology innovators, or IT security consultancies would all be appropriate.
CyberEdge hosts multi-sponsor webinars pertaining to dozens of IT security technologies, services, and topics of the day. Participating in one of our webinars is an easy, cost-effective way to generate quality leads. Select one or more topics below to view relevant upcoming webinars. Then contact your CyberEdge sales representative for more information or to sign up.
Identity management solution providers, authentication technology innovators, or IT security consultancies would all be appropriate.
Any provider of solutions and services for Endpoint Detection & Response (EDR), Extended Detection & Response (XDR), Endpoint Protection Platforms (EPP), anti-virus, anti-malware, behavioral analysis, Artificial Intelligence, Machine Learning, continuous monitoring, threat intelligence, forensics and root cause analysis, data encryption and protection, Security Information & Event Management (SIEM), endpoint vulnerability assessment, anomaly detection, endpoint isolation, Identity & Access Management (IAM), or automated patch management would all be a good fit.
Providers of solutions and services specializing in Identity & Access Management (IAM), identity verificatio, or identity security are all appropriate for this session.
Providers offering cybersecurity software, ransomware protection software, data backup and recovery systems, threat detection tools, incident response services, encryption technologies, or other IT solutions and services that help defend against ransomware are all appropriate for this session.
Providers of API security platforms, API management tools, firewall technologies, Intrusion Detection Systems (IDS), Security Information and Event Management (SIEM) solutions, or threat intelligence services would all be suitable.
Providers of CNAPP, development artifact scanning, Cloud Security Posture Management (CSPM), infrastructure as code scanning, Cloud Identity Entitlement Management (CIEM), or cloud workload protection platforms and services would all be a good fit.
Providers of secure coding environments, DevSecOps platforms, Application Security Testing (AST), Static Application Security Testing (SAST), or Agile Development Systems would all be an excellent fit for this session.
Providers specializing in network security technologies, cybersecurity solutions, Identity & Access Management (IAM) platforms are all appropriate for this session. This includes providers of next-generation firewalls (NGFW), IAM solutions, threat detection platforms, threat intelligence, application awareness and control, or Quality of Service (QoS) management.
Providers of solutions and services to secure cloud applications, including Software-defined Wide Area Network (SD-WAN), Firewall as a Service (FWaaS), Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Zero Trust Network Access (ZTNA), Data Loss Prevention (DLP), network security, or Identity & Access Management (IAM) would all be appropriate for this session.
Providers of secure coding environments, DevSecOps platforms, agile development systems, or application security testing would all be appropriate for this session.