Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!

Thycotic PAM, IT and
Cyber Security Webinars

Ongoing education, on-demand


The Risks of Inconsistent Web Application Security

Watch the Webinar


Web application security is essential to protect the now borderless perimeter that exists in IT.  With the directtocloud transition in full effect SaaS, SECaaS and IaaS solutions are now the front lines.  But there’s no reason to lower the guard within the perimeter because most web applications still exist internally, including but not limited to custom, legacy, network, security, IoT, and infrastructure.   

All applications, regardless of their location inside or outside the perimeter are, and will always be, the target of cyber criminals.  The sudden demand to shift to a remote workforce—and leveraging MSPs and temporary workers—makes securing remote access to all applications a daunting challenge.  

Join Product Marketing Manager Nick Hunter and VP of Product Management Anirban Banerjee for this webinar to see a demo of Thycotic’s Access Controller Suite. Learn how organizations like yours can quickly implement a centralized access control solution that applies consistent granular role-based access controls to all web applications, servers, containers, databases, and infrastructure.  

Who should attend this webinar?

  • IT Security Consultants
  • IT Operations
  • IT Security

What will I learn?

  • How to apply modern authentication solutions, like SSO and MFA, to any type of web application
  • How to implement a zero-trust methodology across all web apps including social media
  • How to enforce granular RBAC, even with custom or legacy web applications
  • How to grant and secure web application access to 3rd parties, contractors, and managed service providers

Get the answers to these important questions

  • How can I quickly deploy a secure and centralized access point for all web applications?
  • Is there a way to record remote access sessions and meet compliance mandates without an agent?
  • Besides MFA and SSO, are there additional ways that I can secure access to sensitive data and controls?
  • Can I implement SSO or RBAC to a legacy application without having to write code?


Nick Hunter

Nick Hunter

  • Thycotic's Technical Product Marketing Manager, Nick Hunter, has over 15 years of experience in a wide range of roles across both the IT and cyber-security space.
  • Has been responsible for the implementation, design, and education of cyber-security marketing, products, and services
  • Expertise in identity, privileged access, and layered security fundamentals
Anirban Banerjee

Anirban Banerjee

  • 12 years of Experience in Enterprise Security, Presenter at Security Conferences
  • 2 startups, 3 NSF Awards, 6 Patents, 12 Peer Review Papers in Computer Science Journals
  • VP and Leads the Access Controller Suite of Products at Thycotic
  • Ph.D. in Computer Science from the University of California, Riverside