About
Despite billions spent annually on IAM, PAM, and IGA tools, over 40% of enterprise applications remain outside the identity perimeter—creating one of the most dangerous and overlooked vulnerabilities in modern identity security. Disconnected apps like vendor portals, legacy tools, and social media platforms often lack SAML, SCIM, or API support, leading to weak credentials, shared accounts, and incomplete deprovisioning.
In this session, Keith Ledgerwood will uncover why these "last mile" gaps pose a growing threat—and how leading enterprises are closing them with smart automation and policy enforcement.
In this session you will:
- Identify the security and compliance risks posed by unmanaged, disconnected applications
- Learn how to automate provisioning, deprovisioning, and MFA enforcement without custom connectors or licensing bloat
- Gain practical strategies to extend your identity perimeter to every app—reducing risk and strengthening access controls organization-wide