By Steve Ferris SVP Global Customer Success, ForgeRock, Alain Barbier Principal Customer Engineer, ForgeRock, Leonard Moustacchis Senior Customer Engineer, ForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Identity Live Paris 2017 | Ian Sorbello, HSBCForgeRock
David and Ian discuss the challenges and opportunities that come with managing customer identity management at HSBC, one of the largest banking and financial services organisations in the world. With over 37 million customers spread across 37 different markets, digital identity has become a strategic initiative for HSBC in order to modernise infrastructure and build stronger relationships with their customers.
This session covers HSBC’s path to consolidating on a single digital identity solution, as well as a few of the reasons why they chose ForgeRock including standards support, biometrics, and API security.
The Pensions Dashboard project is an important and exciting initiative for the UK consumer with an immense social purpose. It has the potential to significantly improve retirement planning, financial inclusion and consumer engagement with the pensions industry. Origo is working with ForgeRock and the wider industry to bring an enabling infrastructure to market. The solution will securely identify the consumer before orchestrating a search of pensions across the industry. Today we will provide a tour of the project to date. We’ll cover the architecture for identity, attribute exchange and resource sharing; bringing this to life with a demonstration.
Ian will discuss the challenges and opportunities that come with managing customer identity management at HSBC, one of the largest banking and financial services organisations in the world. With over 37 million customers spread across 37 different markets, digital identity has become a strategic initiative for HSBC in order to modernise infrastructure and build stronger relationships with their customers. Ian will cover HSBC's path to consolidating on a single digital identity solution, as well as a few of the reasons why they chose ForgeRock including standards support, biometrics and API security.
Connected Car: Putting Digital Identity Behind the WheelForgeRock
A modern connected vehicle is no longer just a car with a built-in wireless access point – it is a complex network of multiple interconnected systems from different vendors that are constantly communicating with each other as well as with various external parties, both consumer-facing and industrial. Each connected car is a rolling IoT ecosystem where industrial applications and protocols coexist with consumer-grade apps and services.
Identity Live Sydney 2017 - Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Mike gives us his view on “Digital Identity’s Next Act” as digital transformation, regulations, and the Internet of Things change the way organizations do business.
Identity Live Paris 2017 | Ian Sorbello, HSBCForgeRock
David and Ian discuss the challenges and opportunities that come with managing customer identity management at HSBC, one of the largest banking and financial services organisations in the world. With over 37 million customers spread across 37 different markets, digital identity has become a strategic initiative for HSBC in order to modernise infrastructure and build stronger relationships with their customers.
This session covers HSBC’s path to consolidating on a single digital identity solution, as well as a few of the reasons why they chose ForgeRock including standards support, biometrics, and API security.
The Pensions Dashboard project is an important and exciting initiative for the UK consumer with an immense social purpose. It has the potential to significantly improve retirement planning, financial inclusion and consumer engagement with the pensions industry. Origo is working with ForgeRock and the wider industry to bring an enabling infrastructure to market. The solution will securely identify the consumer before orchestrating a search of pensions across the industry. Today we will provide a tour of the project to date. We’ll cover the architecture for identity, attribute exchange and resource sharing; bringing this to life with a demonstration.
Ian will discuss the challenges and opportunities that come with managing customer identity management at HSBC, one of the largest banking and financial services organisations in the world. With over 37 million customers spread across 37 different markets, digital identity has become a strategic initiative for HSBC in order to modernise infrastructure and build stronger relationships with their customers. Ian will cover HSBC's path to consolidating on a single digital identity solution, as well as a few of the reasons why they chose ForgeRock including standards support, biometrics and API security.
Connected Car: Putting Digital Identity Behind the WheelForgeRock
A modern connected vehicle is no longer just a car with a built-in wireless access point – it is a complex network of multiple interconnected systems from different vendors that are constantly communicating with each other as well as with various external parties, both consumer-facing and industrial. Each connected car is a rolling IoT ecosystem where industrial applications and protocols coexist with consumer-grade apps and services.
Identity Live Sydney 2017 - Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Mike gives us his view on “Digital Identity’s Next Act” as digital transformation, regulations, and the Internet of Things change the way organizations do business.
Identity Live London 2017 | Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Identity Live Sydney 2017 - Andrew LathamForgeRock
Identity is the key to providing compelling products and services for customers. Digital services are leveraging internet of things (IoT) devices–health sensors, home lighting, commercial building control, connected vehicles, and so on–but security, privacy and consent is a major concern. To provide a secure connected experience for customers, you need a holistic identity strategy, where “identities” represent not just humans, but devices, things, and services, and you also need to harness the complex relationships between them. Customers need assurance their interactions with IoT devices are secure, and they need control over how all of their data is used and shared. Learn how you can solve these and other challenging customer identity and access management (CIAM) problems today, and be ready for the identity challenges of the future with ForgeRock.
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
Our latest release of the ForgeRock Identity Platform introduces advanced capabilities to help organizations in the areas of privacy and consent management, IoT, security, and customer experience. These new features will enable you to use digital identity to drive business value for your organization.
Identity Live London 2017 | Ashley StevensonForgeRock
Identity doesn’t just represent a person: in the age of the internet of things, every individual device, machine, appliance, you-name-it that’s connected to the internet has an identity.
With a Digital Identity System of Record in place, you can establish secure relationships between the digital identities of people, people and things, and between things themselves.
Across the board, from utilities to services and everything in between, secure smart devices can now improve the quality and responsiveness of products and services we use.
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...ForgeRock
Daniel Raskin, SVP Product Management, ForgeRock - The identity world is evolving … again. The growth of IoT endpoints is outpacing the scale of standard identity platforms. More non-traditional things are now given digital identities. New device protocols force identity platforms to become proficient in "foreign languages," in order to communicate with next-generation devices and services. The identity use case of yesteryear is gone: We need to reinvent what a typical identity deployment looks like. In this session, we will explore this changed world and discuss how identity needs to adapt.
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseForgeRock
The ForgeRock Identity Platform is trusted by companies around the world to be their foundation for digital transformation. ForgeRock extends their leadership in this space with the latest release of the ForgeRock Identity Platform, featuring advanced capabilities to meet the needs of today’s consumer facing digital services. In this webinar, learn how new features improve customer engagement and insight, offer greater privacy controls, extend security and usability for internet of things (IoT), enable DevOps and dynamic architectures, and more.
Identity Live Sydney 2017 - Ashley StevensonForgeRock
Identity doesn’t just represent a person: in the age of the internet of things, every individual device, machine, appliance, you-name-it that’s connected to the internet has an identity.
With a Digital Identity System of Record in place, you can establish secure relationships between the digital identities of people, people and things, and between things themselves.
Across the board, from utilities to services and everything in between, secure smart devices can now improve the quality and responsiveness of products and services we use.
Identity Gateway with the ForgeRock Identity Platform - So What’s New?ForgeRock
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Devices, and Things: Better Than a Fish in Your Ear
In the Hitchhiker’s Guide to the Galaxy they have a handy little thing called a Babel Fish. Put it in your ear and you can instantly communicate with anything, anywhere in the galaxy. It’s quick and painless and works great. And that’s exactly how the ForgeRock Identity Gateway works too. It’s a simple, standards-based approach to extend access to web applications, application programming interfaces (APIs), and devices and things. The ForgeRock Identity Gateway, provides a flexible policy enforcement point to support your current environment while migrating towards a modern, standards-based platform. So you can connect digital assets across your ecosystem, with minimal-to-no changes. And no slimy little fish required!
Highlights:
- Intro to the ForgeRock Identity Platform
- New features available in this release
- Maintaining existing infrastructure through password replay
- Gateway and a Mobile device walk into a bar….
- Federating services
- Mobilizing those apps
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Securing Access to SaaS Apps with WSO2 Identity ServerWSO2
Software as a Service (SaaS) is rapidly emerging as the dominant delivery model for meeting the needs of enterprise IT services. According to Gartner the worldwide public cloud services market will grow by 18% in 2017 and cloud application services (SaaS) is expected to grow by 20.1% and reach $46.3 billion.
This growth raises enterprise security concerns and the importance for mobility adds on to the challenges you will face when adopting SaaS application. You need to implement a complete identity management solution that ensures secure access to your SaaS apps and safeguards sensitive data that reside in them.
Ishara Karunaratne and Farasath Ahamed of WSO2 explored how you can leverage WSO2 Identity Server to address the security needs when adopting a SaaS solution and preserve your industry security standards.
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
ForgeRock proposes a new approach for IoT security, where identity principles are used to ensure the authenticity of IoT devices and their communications. We call this upcoming technology, ForgeRock Edge Security. Using secure, standards-based tokens and providing comprehensive, policy-based controls for controlling access to data from devices, this is the next generation of IoT edge security. With examples from industrial and automotive IoT environments, learn how this new way of providing security “on the edge” can provide a rock solid layer of security for your IoT deployments.
The Future is Now: What’s New in ForgeRock Identity Management ForgeRock
In this webinar, learn how ForgeRock Identity Management makes it easy for users to sign up to services using full-featured social registration capabilities, provides integration with Customer Data Management (CDM) systems, and is ready for today’s future-proof customer identity and access management (CIAM) solutions, and much more.
Identity Live London 2017 | Daniel RaskinForgeRock
You still need to protect employees in the digital age, but the real opportunity for digital transformation lies in using identity not just to protect employees, but to get to know, interact with, and connect to prospects and customers across any channel–whether cloud, social, mobile, or the Internet of Things (IoT).
Customer Identity Management requires going above and beyond a secure login. From a security perspective, you need continuous security that follows the user throughout their entire session.
And as customers share data, from demographics to preferences to buying habits, you can use it to create authentic, engaging customer experiences that lead to lasting customer relationships. Better yet, you can earn customer trust while meeting privacy regulations like GDPR, by giving customers control over who has access to their data and for how long.
Identity Live Sydney 2017 - Andrew LathamForgeRock
Identity is the key to providing compelling products and services for customers. Digital services are leveraging internet of things (IoT) devices–health sensors, home lighting, commercial building control, connected vehicles, and so on–but security, privacy and consent is a major concern. To provide a secure connected experience for customers, you need a holistic identity strategy, where “identities” represent not just humans, but devices, things, and services, and you also need to harness the complex relationships between them. Customers need assurance their interactions with IoT devices are secure, and they need control over how all of their data is used and shared. Learn how you can solve these and other challenging customer identity and access management (CIAM) problems today, and be ready for the identity challenges of the future with ForgeRock.
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
Our latest release of the ForgeRock Identity Platform introduces advanced capabilities to help organizations in the areas of privacy and consent management, IoT, security, and customer experience. These new features will enable you to use digital identity to drive business value for your organization.
Identity Live London 2017 | Ashley StevensonForgeRock
Identity doesn’t just represent a person: in the age of the internet of things, every individual device, machine, appliance, you-name-it that’s connected to the internet has an identity.
With a Digital Identity System of Record in place, you can establish secure relationships between the digital identities of people, people and things, and between things themselves.
Across the board, from utilities to services and everything in between, secure smart devices can now improve the quality and responsiveness of products and services we use.
Identity Objects in Mirror Are Closer Than They Appear - Identity Live 2017 -...ForgeRock
Daniel Raskin, SVP Product Management, ForgeRock - The identity world is evolving … again. The growth of IoT endpoints is outpacing the scale of standard identity platforms. More non-traditional things are now given digital identities. New device protocols force identity platforms to become proficient in "foreign languages," in order to communicate with next-generation devices and services. The identity use case of yesteryear is gone: We need to reinvent what a typical identity deployment looks like. In this session, we will explore this changed world and discuss how identity needs to adapt.
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseForgeRock
The ForgeRock Identity Platform is trusted by companies around the world to be their foundation for digital transformation. ForgeRock extends their leadership in this space with the latest release of the ForgeRock Identity Platform, featuring advanced capabilities to meet the needs of today’s consumer facing digital services. In this webinar, learn how new features improve customer engagement and insight, offer greater privacy controls, extend security and usability for internet of things (IoT), enable DevOps and dynamic architectures, and more.
Identity Live Sydney 2017 - Ashley StevensonForgeRock
Identity doesn’t just represent a person: in the age of the internet of things, every individual device, machine, appliance, you-name-it that’s connected to the internet has an identity.
With a Digital Identity System of Record in place, you can establish secure relationships between the digital identities of people, people and things, and between things themselves.
Across the board, from utilities to services and everything in between, secure smart devices can now improve the quality and responsiveness of products and services we use.
Identity Gateway with the ForgeRock Identity Platform - So What’s New?ForgeRock
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Devices, and Things: Better Than a Fish in Your Ear
In the Hitchhiker’s Guide to the Galaxy they have a handy little thing called a Babel Fish. Put it in your ear and you can instantly communicate with anything, anywhere in the galaxy. It’s quick and painless and works great. And that’s exactly how the ForgeRock Identity Gateway works too. It’s a simple, standards-based approach to extend access to web applications, application programming interfaces (APIs), and devices and things. The ForgeRock Identity Gateway, provides a flexible policy enforcement point to support your current environment while migrating towards a modern, standards-based platform. So you can connect digital assets across your ecosystem, with minimal-to-no changes. And no slimy little fish required!
Highlights:
- Intro to the ForgeRock Identity Platform
- New features available in this release
- Maintaining existing infrastructure through password replay
- Gateway and a Mobile device walk into a bar….
- Federating services
- Mobilizing those apps
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Securing Access to SaaS Apps with WSO2 Identity ServerWSO2
Software as a Service (SaaS) is rapidly emerging as the dominant delivery model for meeting the needs of enterprise IT services. According to Gartner the worldwide public cloud services market will grow by 18% in 2017 and cloud application services (SaaS) is expected to grow by 20.1% and reach $46.3 billion.
This growth raises enterprise security concerns and the importance for mobility adds on to the challenges you will face when adopting SaaS application. You need to implement a complete identity management solution that ensures secure access to your SaaS apps and safeguards sensitive data that reside in them.
Ishara Karunaratne and Farasath Ahamed of WSO2 explored how you can leverage WSO2 Identity Server to address the security needs when adopting a SaaS solution and preserve your industry security standards.
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
ForgeRock proposes a new approach for IoT security, where identity principles are used to ensure the authenticity of IoT devices and their communications. We call this upcoming technology, ForgeRock Edge Security. Using secure, standards-based tokens and providing comprehensive, policy-based controls for controlling access to data from devices, this is the next generation of IoT edge security. With examples from industrial and automotive IoT environments, learn how this new way of providing security “on the edge” can provide a rock solid layer of security for your IoT deployments.
The Future is Now: What’s New in ForgeRock Identity Management ForgeRock
In this webinar, learn how ForgeRock Identity Management makes it easy for users to sign up to services using full-featured social registration capabilities, provides integration with Customer Data Management (CDM) systems, and is ready for today’s future-proof customer identity and access management (CIAM) solutions, and much more.
From Denver based identity and access management vendor Ping Identity comes this presentation explaining how financial services can benefit from identity management solutions.
The Future is Now: What’s New in ForgeRock Access Management ForgeRock
In this webinar, learn how new capabilities in ForgeRock Access Management enable cloud automation for dynamic architectures, dramatically improve security, and ensure future-proofing for in-demand technologies such as DevOps and IoT, making it an ideal choice for securing customer identity and access management (CIAM) deployments for both today and for tomorrow.
Beyond username and password it's continuous authorization webinarForgeRock
Legacy access management using simple usernames and passwords at the 'digital front door' is not enough in today's connected-everywhere mobile environment. Wouldn't it be better if access decisions were made at the moment each access attempt is made for every resource? And wouldn't it be even better if policies considered real-time and historical user and session data to assess risk, and reacted accordingly by scaling authentication requirements up or down dynamically? In this webinar, learn how the ForgeRock Identity Platform can do this and much more, to keep your users happy and your data secure.
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
The ForgeRock Identity Platform and Edge security solution can turn any IoT device into a secure, trusted active subject enrolled and on-boarded from a hardware based root of trust to become an autonomous entity in your business relationship eco system represented by a digital twin.
Deliver secure, seamless access to your resources with a leading SSO provider. Ping Identity’s single sign-on solution provides authentication for the workforce, partner and customer identities to SaaS, web apps, mobile apps, and APIs, no matter where they’re hosted.
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
Sean Doherty, Analyst for the Workforce Productivity & Compliance Channel at 451 Research, and Eve Maler, ForgeRock’s Vice President of Innovation and founder of the User-Managed Access standard answer Frequently Asked Questions about the General Data Protection Regulation(GDPR). Added bonus: catch a sneak peek of our new Profile & Privacy Management Dashboard.
Driving Digital Transformation through Big Data Analytics and Machine LearningWSO2
Learn how Verizon’s big data and AI platform is embracing digital transformation, and how it delivers actionable insights, predictions, and trends to its digital consumers.
The Road to Intelligent Authentication JourneysForgeRock
The pressure is on. You need to build a great customer login experience that is secure but doesn’t burden your customers with complicated password requirements. But wait, there’s more – you also need to personalize the login experience and provide metrics back to the business. Legacy authentication has you boxed in. What are you to do? Solutions like multi-factor authentication (MFA) are replacing traditional login methods but its limitations are often static and offer up inconsistent customer experiences, leading to abandonment. Organizations need an intelligent authentication approach that strikes a balance between usability, security, and customer choice. In this webcast you will learn what Intelligent Authentication is and how it enables you to: Easily configure, measure, and adjust login journeys using digital signals including device, contextual, behavioral, user choice, and risk-based factors Leverage user login analytics to increase user adoption rates, and improve the customer experience Automatically redirect suspicious users for further monitoring Quickly consume out-of-the-box authenticators, utilize existing authenticators, and integrate with cyber security solutions — all in one place
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
Today’s enterprise mobility solutions emphasize heavy-handed IT governance of devices and applications that impose a burden on developers and/or users. However, managing data and applications using high performance mobile-optimized infrastructure can enable secure, scalable apps while minimizing the effort required by developers and allowing them to focus on their strengths. Come learn how to facilitate the best of both worlds – multi-layer mobile security using modern standards and a fantastic user experience.
Eliminating Passwords with Biometrics for Identity Access Management WebinarVeridium
Did you know that nearly half of the calls to company help desks are for resetting employee passwords? It's a staggering amount of time, money, and productivity wasted on a single task. How would you like a solution that eliminates passwords for identity management access and uses biometrics instead?
We are one of the leading manufacturers of Controllers for Hotspot management (public WiFi network).
We offer solutions for the entire hospitality industry - tourism, hotels, cafes and restaurants.
Our equipment is manufactured entirely in the USA, fulfilling all the quality standards.
By 2020, there will be 7.6 billion connected people and 75 billion connected devices.
A key to proving your digital business with bold enablement and serious security is having the right authentication solution.
Read this resource to discover how to securely evolve into a digital and mobile enterprise by using key authentication strategies.
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
Authentication and MFA is no longer a one-mode-fits-all experience. Customer-centric companies need flexible intelligence models and simple, consistent login journeys across channels—web, call center, mobile—without being forced to bolt MFA on top of usernames and passwords. ForgeRock’s VP, Global Strategy and Innovation, Ben Goodman, and Trusona’s Chief Design Officer, Kevin Goldman, explain how ForgeRock combined with Trusona creates a broad range of multi-factor authentication modalities all with a consistent user experience, including primary MFA without usernames, passwords or typing whatsoever.
Bonus: Trusona will reveal findings from the first-ever passwordless MFA behavioral research.
Are you benefiting from billions of revenue opportunity available with Cloud Computing? Find out how Microsoft can help businesses and partners like you grow your company and migrate off of legacy technologies.
Join Richard Harbridge as he explains the state of the enterprise mobility industry today and what new innovations and capabilities have been introduced and how other organizations are realizing tremendous value with those new technologies.
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
Containerized IAM on AWS and Beyond
The do’s and don’ts of running containerized Identity systems in the cloud and what it’s like to run and operate this type of solution
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
Containerized IAM on Amazon Web Services - Deep Dive
A deep technical look at the architecture behind running containerized IAM on AWS and what your team needs for a successful deployment
You’ll experience an in depth review of:
Assets and processes needed to containerize ForgeRock
Architecture and processes guiding containerized IAM on AWS
How containers are deployed into Kubernetes
Monitoring and management strategies
Continuous integration configuration
Applying Innovative Tools for GDPR SuccessForgeRock
The GDPR's enforcement date is finally around the corner: May 25th. Have you successfully conceived of this groundbreaking EU regulation as a business opportunity? Have you addressed the challenges of both compliance and customer trust in a more comprehensive fashion? In this webcast, ForgeRock experts Nick Caley, VP of Financial and Regulatory, and Eve Maler, VP of Innovation and Emerging Technology, and Carlos Scott, Digital Risk Consultant will:
Discuss the GDPR in the context of regulatory compliance, digital innovation, and "ripped from the headlines" tensions in consumer trust and the personal data economy
Describe important privacy, consent, and trust innovations made in recent times, including in the standards world (OAuth, UMA, and more)
Demonstrate capabilities of the ForgeRock Identity Platform that address GDPR requirements, including a Profile and Privacy Management dashboard
Identity Live in Austin 2018 keynote presentation
Presenters:
Hermann Wimmer, Chief Revenue Officer & Global Field Operations, ForgeRock
Steve Ferris, SVP, Global Customer Success and Co-Founder, ForgeRock
Peter Barker, EVP & Chief Product Officer, ForgeRock
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
Presented by Stein Myrseth, Senior Technology Solutions Director of ForgeRock and Gerhard Zehethofer, VP or Industries (IOT & Manufacturing) present at Identity Live in Austin in 2018
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Thank you, Steve, for this presentation and introduction!
ForgeRock a réalisé, récemment, un projet de modernisation digitale dans le domaine de la grande distribution. Cette société souhaitait grâce à cette nouvelle expérience digitale améliorer sa connaissance et ses interactions avec ses clients tant dans les magasins qu’à l’extérieur. Afin de mieux comprendre les habitudes de consommation de ses clients, ils avaient également besoin d’analyser les relations au niveau de la famille et de personnaliser les applications dans ce contexte.
La facilité d’utilisation était une des clés de ce projet.
Sur cette base nous avons réalisé une démonstration que nous allons vous présenter.
Merci Léonard. L’expérience utilisateur est directement lié à la connaissance qu’à l’application de cet utilisateur, de son comportement. Car mieux une application vous connaît plus elle est capable de fournir un service de qualité. On peut alors offrir une meilleure expérience, peut-être vous vendre des choses différentes. Il s’agit exactement des mêmes processus que l’on trouve dans la vie courante adapté au monde digital. Nous allons collecter des signaux digitaux envoyés par un navigateur, un mobile, tous type d’objet communiquant de déterminer votre contexte de navigation. Cette connaissance va s’ajouter au contexte existant et va nous permettre d’avoir une meilleure connaissance de vos habitudes de navigation et de mieux protéger votre identité et les services. Par exemple nous pouvons enrichir l’application présentée par Leonard en y ajoutant une géolocalisation qui va permettre de savoir si un client est dans un magasin ou pas et ainsi de proposer des promotions locales au magasin sinon le produit est mis dans le panier. Le contexte d’identité est utilisé pour personnaliser le comportement de l’application par rapport à un individu. Nous pouvons aussi utiliser le contexte d’identité pour agir sur le contrôle d’accès.
Par exemple de nombreuses organisations ont été attaquées par le virus wanna cry. Ce virus tirait parti du fait que des machines exécutant Windows XP n’avaient pas été mise à niveau. Si un système de contrôle d’accès avait pu déterminer le système d’exploitation du client comme nous pouvons le faire dans ce schema, alors l’accès aurait pu être interdit ou un intitulé du risque aurait été introduit à destination des applications.
Ce sont les idées essentielles qui ont suscitées la création des arbres de décision afin d’une part d’améliorer la connaissance qu’on les applications de l’individu par rapport à son environnement, son historique, sa localisation, ses habitudes, d’autre part de protéger l’accès aux applications à partir des signaux digitaux reçus tels que le type de dispositif par exemple un mobile ou un pc, le type de navigateur, des informations sur la signature du terminal et tous autres types d’informations transmises.
Ces différentes informations sont consolidées dans un contexte d’identité qui permettra de déterminer les meilleures options possibles pour identifier l’utilisateur, le niveau de risque, d’adapter le flux d’authentification aux préférences des services et finalement de transmettre ce contexte aux applications pour qu’elles puissent l’utiliser afin de personnaliser l’expérience utilisateur.
Ces arbres de décisions sont capables d’utiliser des services externes pour déterminer le risque d’une transaction. Vous avez probablement entendu parler il y a quelques années (2013) que le site d’Adobe avait été compromis et quelques 150 millions d’identités avaient été dérobées et malheureusement j’en ai fait partie. Dans le graphique suivant nous utilisons deux services externes l’un Open Threat Intelligence qui utilise le site https://cymon.io qui permet de tracker les malware, phishing, botnets, spam entre autre, l’autre Have I been pwned (http://haveibeenpwned.com) permet de déterminer à partir de votre adresse email de savoir si vous avez subit un vol d’identité et ainsi d’associer un risque élevé à l’utilisation de compte dérobés et éventuellement de certifier l’identité en utilisant un autre facteur d’authentification. Ces différents nœuds sont très simples à développer et il existe même des nœuds préconfigurés auxquels il est juste nécessaire d’ajouter la logique de traitement. Cette flexibilité permet de s’adapter très simplement à de nouveau usages.
Je souhaiterais terminer pour cette partie avec un exemple relatif à l’Internet des Objets. Nous avons dans ce schéma un véhicule qui m’appartient et que je peux prêter aux membres de ma famille. Ce véhicule possède de capacité de connexion et me permet d’authentifier ma clé sans contact puis mon identifiant permet d’obtenir mes préférences après vérification de mon identité via mon portable qui sont ensuite transmise à mon système.