
Resources
Ready to start your IAM project?
Our experts look forward to talking with you.
Results: 40

Building the Foundation for Zero Trust with Microsoft Entra ID
Explore the powerful capabilities of Microsoft Entra ID, including Conditional Access, Risk-Based Authentication, and Passwordless Multi-Factor Authentication (MFA).

IAM Made Easy – Demystifying the Complexity of Business Roles
Join us and our partner Nexis as we reveal a smarter approach to business role management—built on top of your existing IGA solution for seamless integration and enhanced control.

The New Kid on the Block: Entra ID Governance
Explore Entra ID Governance, SAP integration, and best practices in part 2 of our Microsoft webinar series.

Identity Under Attack: How to Build a Resilient Zero Trust Strategy
Get explore how identity and network layers must align to strengthen your Zero Trust posture, and more!

Identity Threat Landscape 2025: How Do I Protect My Company Against Deepfake, GenAI and more?
Protect your company from DeepFake, GenAI and modern threats in identity management.

Why Is Your Active Directory an Easy Target for Attackers?
Learn how leading experts tackle fraud attacks with a modern Identity Security approach.

Fraud Attacks Rising: How to stay one step ahead with a modern security approach
Learn how leading experts tackle fraud attacks with a modern Identity Security approach.

Can Your MFA Stand Up to a Zero Trust Assessment?
Explore how to measure your MFA’s Zero Trust maturity and enhance your enterprise-wide identity security strategy.

Redefining Digital Identity and Access Management: Decentralized Identities and Regulations
Discover with Procivis how Decentralized Identity (DID) and new regulations like eIDAS 2.0 and Swiss eID are shaping digital identity management.

CTO & CEO Discussion: Strengthening Identity Management in a World of Increasing Account Takeover Risks
Explore real-world insights, practical strategies, and effective solutions to strengthen your identity management framework with Silverfort.

Transforming B2B CIAM: Strategies for Effective Access Management in Digital Collaboration
Master B2B models, admin tasks, and custom login journeys to enhance your CIAM strategy, with insights and live demos from iC Consult and WSO2 experts.
Want to join us live?
Register now for one of our upcoming webinars.
Results: 9

Event
Stay Ahead with IAM Insights
Keep yourself informed on the latest IAM trends and upcoming Identity & Access Management events. Subscribe now!