Live Webinar (17 november 2020): Privileged Access Cloud Security: Insider tips en aanbevolen procedures

Dinsdag, November 17, 2020: 10.00 uur CET

Er wordt steeds vaker gekozen voor cloudtoepassingen en -services en dat brengt ook uitdagingen met zich mee. Organisaties van over de hele wereld worstelen met de kennis en kunde over privileged access van externe werknemers, derden en contractanten. Het belang van deze kennis en beveliging is echter wel hoog. Wist u bijvoorbeeld dat 77% van de hacks in cloud een gevolg is van gelekte inloggegevens? Het wordt de hoogste tijd dat uw gebruikers gemakkelijk èn veilig toegang krijgen tot de cloud.

Sluit aan bij de webinar van SecurIT en Thycotic over Privileged Access Cloud Security. Wij leggen onze praktische aanpak uit en geven u handvatten voor het definiëren en implementeren van privileged best practices voor cloud security. 

Krijg de antwoorden op deze belangrijke vragen: 

  1. Wat zijn de kritieke verschillen die voortvloeien uit privileged toegang tot cloudtoepassingen? 
  2. Hoe creëren overprivileged gebruikers een van de grootste risico’s in de cloud? 
  3. Wat is de beste manier om een aanpak met de minste bevoegdheden te implementeren die de toegang tot cloud privileged access garandeert? 
  4. Welke geautomatiseerde tools kunnen helpen bij het beheren en beveiligen van privileged access voor cloudtoepassingen? 
  5. Welke materialen of bronnen ontvang ik? 

Consumer IAM (CIAM) for Dummies

This book gives security and marketing leaders a practical understanding of consumer identity and access management services (CIAM). It describes the key differences between consumer and workforce identity, the business drivers, technology, and capabilities of CIAM solutions. Most importantly, you will discover practical advice and strategies to plan and deploy a successful CIAM platform.

This book will help you:

  • Explore the use cases and benefits of CIAM
  • Identify planning and strategy considerations
  • Understand functional requirements for a CIAM platform
  • Avoid the pitfalls of launching a CIAM platform for your business

CIAM for Dummies


Send download link to:

I confirm that I have read and agree to the Privacy Policy.

Subscribe to get exclusive content and recommendations every month. You can unsubscribe anytime.

About SecurIT

Founded in 1999, SecurIT has over 18 years of extensive experience of designing, implementing, maintaining large Identity Management/Governance infrastructures. With more than 30 specialists permanently employed in the Netherlands SecurIT offers its customers high quality consultancy, implementation, management and support services (24*7). 

Customer Identity and Access Management & GDPR

Nowadays, customer experience is high on the priority list. Especially when it comes to the convenience of ordering a product. You prefer to fill something in, and you have the product in one click the next day. Comfort should also be possible on various devices (think of a laptop and a tablet or a phone). At the same time, the focus on security- and privacy concerns peaked as well.  

In this environment, where ease of use is an important reason to attract customers and retain them, developers desire to obtain more customer data. With this data, they can further optimize the application to achieve even higher customer satisfaction.

However, there is also a downside to this data hunger. There is a greater responsibility to secure this kind of data. In these times of more massive data breaches and on top of that stricter rules to follow, the GDPR is not the sole responsibility of developers to keep the data safe. How can you ensure that the data that you acquired is protected by legislation?

Protect acquired data according to legislation with CIAM

 CIAM can help! A good, scalable CIAM solution includes all the features needed for safe and efficient customer identity management and its associated access. It regards:

Customer registration: CIAM solutions offer several possibilities for identifying a user identity. For example, you can use social media accounts for registration and self-service registration to ensure a hassle-free registration.  

Authentication & Multi-Factor Authentication (MFA): CIAM makes it possible to implement authentication mechanisms such as adaptive authentication, MFA, and social logins to strengthen the authentication process.

Compliance: Developers can implement authorization policies through CIAM to minimize data shared with third parties and be compliant with data privacy rules such as the GDPR.


CIAM makes managing digital identities as easy, secure, and streamlined as possible and providing an optimal experience to your new and existing customers. All that, and you also make sure that you comply with the current GDPR rules.

Identity-as-a-Service (IDaaS) is ideally suited to provide the necessary support to developers in this fast-moving world.

Want to start, but don’t know how? Just talk with us!

    Over 900 plaintext Passwords for Pulse Secure Enterprise VPNs Exposed

    According to ZDNet, researchers recently found more than 900 plaintext passwords for Pulse Secure enterprise VPNs on a well-known hacker forum:

    Doron Naim, Cyber Research Group Manager, CyberArk Labs had this to say about the incident:

    “While VPNs have an essential role to provide employees and third parties with remote access, they also provide a direct data tunnel to corporate networks which can be used to provide privileged access to critical business systems and applications i.e. the targets that are most valuable for hackers. 

    In the case of the Pulse Secure VPN breach, usernames, plain-text passwords, and IP addresses were exposed. In an of itself, that’s concerning, but attackers could also take advantage of password reuse habits to conduct credential-based attacks on internal systems and business applications like HR and payroll — providing a backdoor to critical data and assets.  

    In light of this and other well-publicized breaches, it’s important organizations examine other ways to provide remote access to the most sensitive parts of the corporate network. This includes advances in Zero Trust access, granular access to only the critical system instead of the whole network, biometric multi-factor authentication and just-in-time provisioning, in combination with session isolation and management. This would allow VPNs to be dispensed with completely in some instances, including for privileged access to critical systems. Additionally, it reinforces the need to patch, whether the software lives in the cloud or the enterprise itself.”

    Original Article

    What Is Customer Identity and Access Management (CIAM)?

    What Is Customer Identity and Access Management (CIAM)?

    Customer identity and access management (CIAM) makes the customer login experience complete. There is more at stake than just registration and authentication, and that is why CIAM has come into play. But what is CIAM, and why do you need to know about it?

    Customer identity and access management (CIAM) is a digital identity management software solution for businesses that combines login verification with customer data storage. CIAM aims to improve the customer’s sign-up and login experience while securely managing customer identities. It also offers the luxury of a centralized customer database that links all other apps and services to provide a secure and seamless customer experience.

    CIAM ensures a secure, seamless customer experience
    Strong CIAM solutions usually provide a combination of features including customer registration, self-service account management, consent and preference management, single sign-on (SSO), multi-factor authentication (MFA), access management, directory services and data access governance. The best CIAM solutions ensure a secure, seamless customer experience at extreme scale and performance, no matter which channels (web, mobile, etc.) customers use to engage with a brand.

    These solutions can be delivered via software that can be deployed on premises, in private clouds or via API-first Identity-as-a-Service (IDaaS) platforms. These platforms expose their capabilities—including admin capabilities—via APIs and are geared toward development teams who want to embed CIAM services into their applications. Regardless of delivery method, the goal is to make the experience of accessing digital applications seamless and secure.

    Why is CIAM Important

    Customers want two simple things as they interact with brands. Firstly, they want brands to make it easy for them. They demand great user experiences. Secondly, they expect brands to protect them from fraud, breaches and privacy violations. CIAM helps you do both.

    Delighting your customers means ensuring their journey—from their initial introduction to your brand to the time they become your loyal advocates—is as smooth as possible. If you fall short of providing an exceptional experience, your customers may go elsewhere.

    “One in three customers will walk away from a brand they love after just one bad experience.”

    Source: “Experience is everything: Here’s how to get it right,” PwC, 2018 

    Given what’s at stake, a great customer experience is no longer just nice to have; it’s a critical differentiator. In their ”Experience is everything” report, PwC found that 32% of customers will abandon a favorite brand after just one bad experience.
    You can’t stop at experience either. Customers also care deeply about security. A 2019 Ping Identity report revealed that 81% of customers would stop engaging with a brand online following a breach (a 3% increase over 2018), and one in four would stop all interaction whatsoever. The most recent Cost of a Data Breach study found that of the $3.86 million average cost of a data breach.

    What Is Customer Identity and Access Management (CIAM)? 10

    To give your customers what they want and keep them coming back requires both delighting them and protecting them. Customer IAM helps you strike the ideal balance between customer experience and security, without needing to sacrifice one in pursuit of the other.