Phone Number +1-202-802-9399 (US)

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand

WATCH THIS WEBINAR

The Risks of Inconsistent Web Application Security


Watch the Webinar


 

Web application security is essential to protect the now borderless perimeter that exists in IT.  With the direct-to-cloud transition in full effect, SaaS, SECaaS, and IaaS solutions are now the front lines. The focus isn’t on the applications non-IT business users consume, but it should be. This includes social media and custom or legacy applications.

Social media applications represent an organizations’ brand and reputation but lack granular access controls. There are also custom applications and legacy applications to consider. Both these types of applications often lack the modern authentication techniques and granular access controls required to protect sensitive data.

All applications, regardless of their location inside or outside the perimeter, will always be the targets of cyber criminals.  The sudden demand to shift to a remote workforce and leverage MSPs and temporary workers make securing remote access to all applications a new and daunting challenge.

Join Product Marketing Manager Nick Hunter and VP of Product Management Anirban Banerjee for this webinar to see a demo of Thycotic’s Access Controller Suite. Learn how organizations like yours can quickly implement a centralized access control solution that applies consistent granular role-based access controls to all web applications, servers, containers, databases, and infrastructure.

Who should attend this webinar?

  • IT Security Consultants
  • IT Operations
  • IT Security

What will I learn?

  • How to apply modern authentication solutions, like SSO and MFA, to any type of web application
  • How to implement a zero-trust methodology across all web apps including social media
  • How to enforce granular RBAC, even with custom or legacy web applications
  • How to grant and secure web application access to 3rd parties, contractors, and managed service providers

Get the answers to these important questions

  • How can I implement consistent access controls across all my web applications?
  • Is there a way to record remote access sessions and meet compliance mandates without an agent?
  • Besides MFA and SSO, are there additional ways that I can secure access to sensitive data and controls?
  • Can I implement SSO or RBAC to a legacy application without having to write code?

MEET THE PRESENTERS

Nick Hunter

Nick Hunter

  • Thycotic's Technical Product Marketing Manager, Nick Hunter, has over 15 years of experience in a wide range of roles across both the IT and cyber-security space.
  • Has been responsible for the implementation, design, and education of cyber-security marketing, products, and services
  • Expertise in identity, privileged access, and layered security fundamentals
Anirban Banerjee

Anirban Banerjee

  • 12 years of Experience in Enterprise Security, Presenter at Security Conferences
  • 2 startups, 3 NSF Awards, 6 Patents, 12 Peer Review Papers in Computer Science Journals
  • VP and Leads the Access Controller Suite of Products at Thycotic
  • Ph.D. in Computer Science from the University of California, Riverside

SHARE THIS