Past Webinars
-
Webinar
Dynamic Secrets 101: Using JIT to Improve Security and ComplianceJoin Chris Gruel, Senior Solutions Architect, for a technical discussion on the important elements of just-in-time (JIT) secrets management to improve security and compliance. You’ll learn: - The benefits of using temporary JIT secrets - Top use cases for when and where to use them - Live walk-through of effective implementation strategies Whether you're just starting in secrets management or want to enhance your existing practices, this webinar will provide you with new knowledge and practical skills to elevate your organization's security framework.
-
Webinar
Exploring Rotated Secrets: A Deep Dive into Standard and Custom TechniquesJoin us for an insightful webinar with Chris Gruel, Senior Solutions Architect. This webinar will cover the fundamentals and advanced aspects of secret rotation, with a special focus on custom rotated secrets. Learn why secret rotation is crucial, how to implement custom rotations effectively, and the benefits they bring. This session is designed to provide valuable knowledge and practical tools for improving your organization's security posture.
-
Webinar
Future-Proof Your Credentials: A Deep Dive into Akeyless Password ManagerJoin our webinar to explore the updated Akeyless Password Manager, powered by Distributed Fragments Cryptography DFC™ technology. This session will demonstrate how Akeyless Password Manager strengthens your security protocols and integrates smoothly with existing secrets management systems. Learn about the specific security advantages of Akeyless DFC™ through a live demo and understand how this tool can fit into your organization’s security stack. Whether you’re looking to improve your password management or seeking a comprehensive security solution, this webinar will provide practical insights and essential knowledge to help protect your organization.
-
Webinar
IDC Spotlight: Securing the Enterprise with Modern Secrets ManagementJoin IDC Analyst Katie Norton, Akeyless CEO and Co-founder Oded Hareven, and Akeyless CMO Suresh Sathyamurthy for an insightful fireside chat on the crucial role of secrets management in today's cloud-driven enterprises. The panel will discuss key findings from IDC's latest spotlight paper and share expert strategies for effectively securing sensitive information, streamlining secrets management operations, and ensuring compliance through proper secrets governance. Learn why Akeyless's innovative secure SaaS approach to secrets management is gaining traction as a powerful solution for modern enterprises. Don't miss this chance to hear from the experts and stay ahead of the curve in protecting your organization's most valuable assets.
-
Webinar
AI DevOps Workshop – Using LLMs to Deploy Kubernetes Helm ChartsIn the rapidly evolving landscape of cloud computing and DevOps, the integration of cutting-edge AI technologies like Large Language Models (LLMs) with Kubernetes deployments represents a significant leap forward. This webinar showcases an innovative approach to automating Kubernetes Helm chart deployments through a LangChain-powered conversational agent, codenamed "Heimdal."
-
Webinar
Just-in-Time Access Unlocked: Strategies for Secure, Dynamic PermissionsAs digital security landscapes evolve, Just-In-Time (JIT) access has become a critical strategy for enhancing organizational security and efficiency. Join Dr. Conor Mancone, Principal Application Security Engineer at Cimpress, in a fireside chat that delves into the whys and hows of JIT access. In this webinar, we'll uncover the journey towards adopting JIT and explore the comprehensive benefits it offers. Conor will share firsthand experiences, challenges, and successes encountered along the way, including the role of Akeyless in facilitating this transition.
-
Webinar
Vaultless: The Future of Secrets ManagementIs your team spending too much time managing vaults instead of managing secrets? The vault-based legacy approach to manage credentials, certificates and keys has become complex, cumbersome and expensive. In this webinar Suresh Sathyamurthy, CMO of Akeyless Security, will share how the vaultless approach will help you lower costs, improve efficiency and enhance security.
-
Webinar
Auto-Rotating Credentials: Safeguarding Legacy and Bare MetalIn an era dominated by cloud technologies, the security of legacy and bare metal systems often takes a back seat, exposing organizations to potential risks and vulnerabilities. Join us for an insightful webinar as we explore the critical challenge of securing these systems and applications through the implementation of auto-rotating credentials, while addressing the most common use cases (including newer technologies like local LLMs) and the complex task of keeping secrets both encrypted and accessible for everyone who needs them.
-
Webinar
Unmasking the Gaps: What Your PAM Solution Doesn’t CoverPrivileged Access Management (PAM) solutions play a vital role in safeguarding sensitive assets and ensuring that privileged users are held accountable for their actions. However, there is an essential aspect that often goes overlooked—the protection of the secrets that DevOps teams rely on in their daily operations. These secrets encompass credentials, certificates and keys and are inextricably linked to machine identities.
-
Webinar
The State of Secrets Management 2024Join Ori Mankali, VP of R&D at Akeyless, for a revealing webinar presenting findings from a recent survey of 200 security professionals and leaders. The survey's key takeaways include the alarming persistence of secrets sprawl, with 96% of respondents admitting to keeping organizational secrets outside of secrets managers in vulnerable areas. Additionally, the webinar explores the true costs of secret leaks, shedding light on the disparities in cost perceptions across management levels.
-
Webinar
How to Choose a Secrets Management SolutionIn an ever-evolving digital landscape, where 54% of security incidents stem from credential theft, the specter of secrets sprawl poses a growing threat. Embracing the imperative of securing your secrets has never been more crucial. But amidst the myriad options, how can you navigate to the ideal solution? Join us for an illuminating webinar as Oded Hareven, CEO of Akeyless, demystifies the process by delineating the eight fundamental requirements that underpin an effective secrets management solution. Arm yourself with this indispensable knowledge to not just bolster security, but to galvanize your entire security strategy. Don't miss this opportunity to pave your path towards an airtight digital future. Your secrets safeguarding journey begins here.
-
Webinar
Secret’s Out: How to Keep Secret Zero out of Cybercriminal PlaybooksSecret Zero. It’s the master key to your system, and only a select few in your organization truly know it. Maybe it’s just you who has access, the only holder of the credentials that unlocks your system vault. Or maybe it’s just you… and who knows how many threat actors.
Ready to get started?
Discover how Akeyless simplifies secrets management, reduces sprawl, minimizes risk, and saves time.
Take a self-guided tour of our top features.
See the platformLearn what Akeyless can do for your team.
Talk to an expert