Past Webinars
-
Webinar
How to Choose a Secrets Management SolutionIn an ever-evolving digital landscape, where 54% of security incidents stem from credential theft, the specter of secrets sprawl poses a growing threat. Embracing the imperative of securing your secrets has never been more crucial. But amidst the myriad options, how can you navigate to the ideal solution? Join us for an illuminating webinar as Oded Hareven, CEO of Akeyless, demystifies the process by delineating the eight fundamental requirements that underpin an effective secrets management solution. Arm yourself with this indispensable knowledge to not just bolster security, but to galvanize your entire security strategy. Don't miss this opportunity to pave your path towards an airtight digital future. Your secrets safeguarding journey begins here.
-
Webinar
Secret’s Out: How to Keep Secret Zero out of Cybercriminal PlaybooksSecret Zero. It’s the master key to your system, and only a select few in your organization truly know it. Maybe it’s just you who has access, the only holder of the credentials that unlocks your system vault. Or maybe it’s just you… and who knows how many threat actors.
-
Webinar
Keeping Up with Secure Identity Needs in a New Cloud-Based WorldCloud, containerization and DevOps methodology, the increased adoption of all three, coupled with the growing popularity of remote workforce strategies, is driving organizations to open their arms to new systems as machine identities far outpace the number of human employees.
-
Webinar
Cloud Identity and Dynamic SecretsDon't miss our upcoming webinar with Chris Gruel of Akeyless Security. In this session, Chris will show you the game-changing power of Cloud Identity integrated with modern SaaS Secrets Management. This is an essential event for professionals managing secrets within the cloud on platforms such as AWS, Azure, and GCS.
-
Webinar
Akeyless ESM: Powering Unified Secrets Management for Hybrid Multi-CloudIn the dynamic landscape of modern enterprises, navigating the complexities of hybrid multi-cloud environments has become a common challenge. Oftentimes, organizations resort to employing separate secrets management solutions for each environment, resulting in fragmented operations and hindered governance.
-
Webinar
Managing the Secrets Behind Machine IdentitiesToday’s IAM professionals face a pressing issue—the rise of machine identities and DevOps automation has caused “Secrets Sprawl,” due to the increase of database credentials, certificates, API keys, and other machine secrets within their environments.
-
Webinar
Akeyless + GitLab: Enterprise-Grade Secrets Management in MinutesIn this workshop, learn how to use GitLab and Akeyless to set up secrets management from scratch. In less than 5 minutes, you can have a fully running production-grade secrets management platform integrated with all your favorite DevOps tools. With low time-to-deploy and zero maintenance required, unleash the power of a fully SaaS offering.
-
Webinar
Rise of the MachinesIt seems like the market has finally agreed that we need to manage user identities, and that's a good thing. But what are we doing about "the machines"? In this session Dr Zero Trust will discuss recent research on the proliferation and risks that are now present for any enterprise as machines become the dominant area of risk via their growth and proliferation across systems. Topics discussed will be related to the need for management of these critical assets and points on how machine identity management must be part of your Zero Trust plan.
-
Webinar
The solution for the Secret Zero problem may be easier than you thinkEvery platform has a Secret Zero—a master secret for all other secrets or the credential that unlocks your secrets vault. The problem: the vulnerability of Secret Zero is the new security gap that cybercriminals are exploiting, contributing to major data breach disasters for organizations. Ori Mankali, VP of R&D at Akeyless, will show you how to utilize Universal Identity to continuously authenticate your Secret Zero with auto-expiring tokens so your master secret remains a security asset, not a liability.
-
Webinar
The Current State of Securing IdentitiesThe increased adoption of cloud, containers, and microservices coupled with remote workforce trends is requiring organizations to reimagine the way they manage and secure identities for both human and machines. This change requires tighter alignment between development, IT operations, and security teams.
-
Webinar
Securing Infrastructure-as-CodeSecrets Management is a segment of DevSecOps tools and methods that are used to manage digital authentication credentials that include things like passwords, keys, APIs, and tokens for use in applications, services, use access and other restricted IT operations. Thanks to the growth of component-based systems and hybrid environments the number of secrets companies have to manage is exploding and becoming increasingly chaotic. Controlling the chaos requires DevSecOps teams to figure out how to authenticate, validate, assign privileged access and secure identifies for both human and machines as part of automated pipelines.
-
Webinar
Best Approach to Secrets ManagementIn this joint webinar with Chef, we tackle key considerations for choosing a secrets management solution and why the SaaS Secrets Management Vaultless® approach is best approach for securing credentials.
Ready to get started?
Discover how Akeyless simplifies secrets management, reduces sprawl, minimizes risk, and saves time.
Take a self-guided tour of our top features.
See the platformLearn what Akeyless can do for your team.
Talk to an expert