Videos

110 videos




1:03.

Demo Trailer: Mercury ISS: How hackers research their targets prior to a cyberattack


Incident Response
1:20.

Demo Trailer: Gridware Cyber Incident Response


IT Marketing
1:00.

60 Second Trailer on StrategyMix Demo Marketing


Cloud DR and Backup
1:05.

Managing data across multiple public clouds / on-prem, with DR and low cost backup to object storage, such as AWS S3


Endpoint Protection
5:50 mins.

Why after 30 years, is malware still not contained and continues to pose a serious threat to even major organisations?


Identity and Access Management
14:02 mins.

How can we match authentication methods to the security profiles of different groups of employees and third-party suppliers? How secure is 2fa and is it worth deploying? What Biometric devices are on the market or coming to the market for remote security?


CIAM
3:13.

Can traditional Employee-based IAM solutions be repurposed for Customer-focused IAM solutions? If not, why not?


CIAM
3:46.

How do you design a seamless registration, authentication and login experience that is frictionless across all channels and devices?


CIAM
3:38.

How can you combine customer identity data with business data to create new revenue opportunities?


CIAM
4:32.

How do we tread the fine line between monitoring our customers to provide them with optimal service and a better buying experience without also being seen as spying on our customers at the expense of their privacy?


CIAM
4:36.

What is the typical maturity model for the adoption of CIAM within a business?


CIAM
3:45. Score: 2.00/5.00

Do you think the number and complexity of features in traditional employee solutions mean the overheads would be too high (both in terms of cost and management/maintenance time) to use them for the customer base?