
App Governance Biomarkers in Entra ID – Your 100-Day Health Check
✅How to assess your current Application Governance risk posture
✅Steps to remediate risky app permissions and configurations
✅ Measures of success along the way
Register for an upcoming live event or watch an on-demand webinar anytime!
Alistair and Nicolas explore:
Come along to Episode 1 of ENow’s Season 3 of its Preventive Maintenance show to find out what the hosts, Nic and Al, believe companies should focus on in 2025 in the world of Application Governance. They’ll be covering:
This session will provide you with insight into the future of application governance trends, what tools you should focus on so that you can improve your posture, and, ultimately, what you should be thinking about in 2025.
As applications proliferate in Entra ID, organizations' attack surface and risk profile increases. Understanding how to prioritize risks, address vulnerabilities, and create an ongoing governance plan becomes essential for protecting your organization. In this webinar, industry experts Nicolas Blank and Alistair Pugin will walk you through the key steps to create a robust risk profile for your Entra ID applications.
During this session, you’ll learn how to:
With the adoption of cloud-based applications and hybrid work environments, the security perimeter is redefined from firewall-based security to Identity based security. Zero Trust offers a more proactive and granular approach to security, assuming that no entity within or outside the network should be trusted without continuous verification. In this session, we explored how Microsoft Entra ID can be leveraged to implement Zero Trust principles for application security.
We discussed the key benefits of Zero Trust, including:
Entra ID, the Identity Management platform for all of Microsoft’s Cloud infrastructure and software services, does not only cater to traditional directory services but also application registrations and, more importantly, security. Identity administrators across the globe have been facing the enormous task of understanding application security patterns and practices. While security standards and frameworks like NIST, ISO 27001, and FISMA exist, many organizations are still figuring out how to apply these standards to Entra ID applications specifically.
This session will give you the confidence to appropriately secure and govern your Entra ID Applications and Identities for an improved security posture and compliance with real-world standards.
With application deployment in the Microsoft cloud as easy as adding a Teams app, Identity, and Security administrators have been inundated with applications popping up in their tenants, with very little knowledge about what they are and what they do. Yes, you should be worried.
Don't let application security vulnerabilities catch you off guard. Equip yourself with the knowledge and tools to protect your applications and the identities they're tied to in Entra ID.
Take advantage of insights that could transform your approach to SaaS application security! With SaaS applications integrated heavily into our Microsoft 365 and Entra ID tenants and user identities, ensuring their security is more critical than ever.
Understand the 'red flags,' most significant risks, and challenges companies face and unlock the secrets of SaaS Security Posture Management.
Drawing from a decade of practical, hands-on experience with Entra ID (A.K.A. - Azure Active Directory), Nicolas Blank and Alistair Pugin share key strategies and methodologies to streamline Entra ID deployment while ensuring adherence to compliance, bolstered security, and operational efficiency. In this session, we cover:
Join us for a webinar on Wed, March 20th at 10 am PST, where Alistair Pugin and Nicolas Blank will walk you through how to identify risky apps in your Entra ID tenant and, more importantly – the steps you need to take next to fix and securely configure applications. They’ll focus on things like:
In this session, Microsoft MVPs Alistair Pugin and Nicolas Blank will explore the top 5 risks associated with application security and more, including: