<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Elimity</itunes:name>
            <itunes:email>chiel@elimity.com</itunes:email>
        </itunes:owner>
        <title>Videos</title>
        <link>https://videos.elimity.com</link>
        <description></description>
        <language>en-us</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Elimity</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://videos.elimity.com/files/rv0.0/sitelogo.gif"/>
        <image>
            <url>https://videos.elimity.com/files/rv0.0/sitelogo.gif</url>
            <title>Videos</title>
            <link>https://videos.elimity.com</link>
        </image>
        <atom:link rel="self" href="https://videos.elimity.com/podcast/videos-1"/>
        <atom:link rel="next" href="https://videos.elimity.com/podcast/videos-1?p=2&amp;album%5fid=90918557&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/video_medium/case-study-geoxyz-1-video.mp4?source=podcast" type="video/mp4" length="11037342"/>
            <title>Case Study - GEOxyz</title>
            <link>http://videos.elimity.com/case-study-geoxyz-1</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;How GEOxyz Took Control Over User Access to Support ISO 27001 Compliance&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;GEOxyz operates in a highly data-driven and security-sensitive environment. With a growing digital footprint and increasing regulatory pressure from &lt;strong&gt;ISO 27001&lt;/strong&gt; and &lt;strong&gt;NIS2&lt;/strong&gt;, the organisation needed a clear, defensible understanding of &lt;strong&gt;who has access to what&lt;/strong&gt;, &lt;strong&gt;and why&lt;/strong&gt;, across its critical systems.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&#128073; Download the full customer story:&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/case-studies/geoxyz"&gt;https://elimity.com/case-studies/geoxyz&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/case-study-geoxyz-1"&gt;&lt;img src="http://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/123404654</guid>
            <pubDate>Mon, 09 Feb 2026 15:15:34 GMT</pubDate>
            <media:title>Case Study - GEOxyz</media:title>
            <itunes:summary>How GEOxyz Took Control Over User Access to Support ISO 27001 ComplianceGEOxyz operates in a highly data-driven and security-sensitive environment. With a growing digital footprint and increasing regulatory pressure from ISO 27001 and NIS2, the organisation needed a clear, defensible understanding of who has access to what, and why, across its critical systems.&#128073; Download the full customer story:https://elimity.com/case-studies/geoxyz</itunes:summary>
            <itunes:subtitle>How GEOxyz Took Control Over User Access to Support ISO 27001 ComplianceGEOxyz operates in a highly data-driven and security-sensitive environment. With a growing digital footprint and increasing regulatory pressure from ISO 27001 and NIS2, the...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:59</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;How GEOxyz Took Control Over User Access to Support ISO 27001 Compliance&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;GEOxyz operates in a highly data-driven and security-sensitive environment. With a growing digital footprint and increasing regulatory pressure from &lt;strong&gt;ISO 27001&lt;/strong&gt; and &lt;strong&gt;NIS2&lt;/strong&gt;, the organisation needed a clear, defensible understanding of &lt;strong&gt;who has access to what&lt;/strong&gt;, &lt;strong&gt;and why&lt;/strong&gt;, across its critical systems.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&#128073; Download the full customer story:&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/case-studies/geoxyz"&gt;https://elimity.com/case-studies/geoxyz&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/case-study-geoxyz-1"&gt;&lt;img src="http://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/standard/download-16-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=43be1a0716aebf73558415b4f6e65003&amp;source=podcast&amp;photo%5fid=123404654" width="625" height="352" type="text/html" medium="video" duration="119" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/standard/download-16-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/standard/download-16-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/video_medium/iam-and-nis-2-5-tips-to-take-video.mp4?source=podcast" type="video/mp4" length="56270749"/>
            <title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </title>
            <link>http://videos.elimity.com/iam-and-nis-2-5-tips-to-take</link>
            <description>&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-and-nis-2-5-tips-to-take"&gt;&lt;img src="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/101971575</guid>
            <pubDate>Mon, 02 Feb 2026 11:51:12 GMT</pubDate>
            <media:title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>22:21</itunes:duration>
            <media:description type="html">&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/iam-and-nis-2-5-tips-to-take"&gt;&lt;img src="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=8a93d34c57aa8c076aa75e7f3047bcae&amp;source=podcast&amp;photo%5fid=101971575" width="625" height="352" type="text/html" medium="video" duration="1341" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/standard/download-11-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM</category>
            <category>Identity Governance</category>
            <category>Keynote</category>
            <category>NIS2</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/video_medium/whos-elimity-interview-by-joobs-video.mp4?source=podcast" type="video/mp4" length="9115432"/>
            <title>Who's Elimity? Interview by Joobs</title>
            <link>http://videos.elimity.com/whos-elimity-interview-by-joobs</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/whos-elimity-interview-by-joobs"&gt;&lt;img src="http://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/113691040</guid>
            <pubDate>Fri, 13 Jun 2025 09:33:33 GMT</pubDate>
            <media:title>Who's Elimity? Interview by Joobs</media:title>
            <itunes:summary></itunes:summary>
            <itunes:subtitle></itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:56</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/whos-elimity-interview-by-joobs"&gt;&lt;img src="http://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=c367d1ec374c4b138b05690bb0a0ec12&amp;source=podcast&amp;photo%5fid=113691040" width="625" height="1111" type="text/html" medium="video" duration="116" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/standard/download-17-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/standard/download-17-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/video_medium/why-did-q42-go-for-iso-27001-1-video.mp4?source=podcast" type="video/mp4" length="3343029"/>
            <title>Why did Q42 go for ISO 27001 Certification? ✅</title>
            <link>http://videos.elimity.com/why-did-q42-go-for-iso-27001-1</link>
            <description>&lt;p&gt;Customer Q42 pursued ISO 27001 certification to enhance their information security practices and meet industry standards.&lt;/p&gt;
&lt;p&gt;This certification is internationally recognized and demonstrates a commitment to managing information securely, which is crucial for engaging in international projects like #Hacktheplanet. Additionally, achieving ISO 27001 helps improve the overall security posture of the organization, ensuring that data is protected against potential threats.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-go-for-iso-27001-1"&gt;&lt;img src="http://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110979408</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>Why did Q42 go for ISO 27001 Certification? ✅</media:title>
            <itunes:summary>Customer Q42 pursued ISO 27001 certification to enhance their information security practices and meet industry standards.
This certification is internationally recognized and demonstrates a commitment to managing information securely, which is crucial for engaging in international projects like #Hacktheplanet. Additionally, achieving ISO 27001 helps improve the overall security posture of the organization, ensuring that data is protected against potential threats.</itunes:summary>
            <itunes:subtitle>Customer Q42 pursued ISO 27001 certification to enhance their information security practices and meet industry standards.
This certification is internationally recognized and demonstrates a commitment to managing information securely, which is...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:04</itunes:duration>
            <media:description type="html">&lt;p&gt;Customer Q42 pursued ISO 27001 certification to enhance their information security practices and meet industry standards.&lt;/p&gt;
&lt;p&gt;This certification is internationally recognized and demonstrates a commitment to managing information securely, which is crucial for engaging in international projects like #Hacktheplanet. Additionally, achieving ISO 27001 helps improve the overall security posture of the organization, ensuring that data is protected against potential threats.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-go-for-iso-27001-1"&gt;&lt;img src="http://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=17633a54a4da9dd0a201c3e362cba3c6&amp;source=podcast&amp;photo%5fid=110979408" width="625" height="352" type="text/html" medium="video" duration="64" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/standard/download-15-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/standard/download-15-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/video_medium/why-did-q42-choose-for-elimity-video.mp4?source=podcast" type="video/mp4" length="7751845"/>
            <title>Why did Q42 choose for Elimity?</title>
            <link>http://videos.elimity.com/why-did-q42-choose-for-elimity</link>
            <description>&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-choose-for-elimity"&gt;&lt;img src="http://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/standard/download-19-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110976294</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>Why did Q42 choose for Elimity?</media:title>
            <itunes:summary>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with renowned brands likePhilips Hue,HEMAandRijksmuseum. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.

What to Expect?

✅ Challenges  Solutions: Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.
✅ Q42’s Perspective: Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.
✅ Live Demo: See how Elimity enables fast and efficient user access management without the complexity.

&#128467;️ Date: March 12th at 4:00 PM CET

Your Hosts?
Maarten Decat: VP Product and Co-Founder Elimity
Jasper Kaizer: Chief Operational Officer Q42

&#128640; Don’t miss out—register now to secure your spot!

</itunes:summary>
            <itunes:subtitle>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:59</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-choose-for-elimity"&gt;&lt;img src="http://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/standard/download-19-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=e7d965752c8b7c653ca93aa35df77278&amp;source=podcast&amp;photo%5fid=110976294" width="625" height="352" type="text/html" medium="video" duration="179" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/standard/download-19-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/standard/download-19-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/video_medium/what-was-q42s-approach-to-identity-video.mp4?source=podcast" type="video/mp4" length="6615042"/>
            <title>What was Q42's approach to Identity Governance? </title>
            <link>http://videos.elimity.com/what-was-q42s-approach-to-identity</link>
            <description>&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-was-q42s-approach-to-identity"&gt;&lt;img src="http://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110976291</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>What was Q42's approach to Identity Governance? </media:title>
            <itunes:summary>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with renowned brands likePhilips Hue,HEMAandRijksmuseum. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.

What to Expect?

✅ Challenges  Solutions: Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.
✅ Q42’s Perspective: Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.
✅ Live Demo: See how Elimity enables fast and efficient user access management without the complexity.

&#128467;️ Date: March 12th at 4:00 PM CET

Your Hosts?
Maarten Decat: VP Product and Co-Founder Elimity
Jasper Kaizer: Chief Operational Officer Q42

&#128640; Don’t miss out—register now to secure your spot!

</itunes:summary>
            <itunes:subtitle>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:43</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-was-q42s-approach-to-identity"&gt;&lt;img src="http://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=5153abb03dbd8cd7e01acda7a6f556aa&amp;source=podcast&amp;photo%5fid=110976291" width="625" height="352" type="text/html" medium="video" duration="163" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/standard/download-17-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/standard/download-17-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/video_medium/why-did-q42-go-for-iso-27001-video.mp4?source=podcast" type="video/mp4" length="3373386"/>
            <title>Why did Q42 go for ISO 27001 Certification? &#128272;</title>
            <link>http://videos.elimity.com/why-did-q42-go-for-iso-27001</link>
            <description>&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-go-for-iso-27001"&gt;&lt;img src="http://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/standard/download-26-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110976287</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>Why did Q42 go for ISO 27001 Certification? &#128272;</media:title>
            <itunes:summary>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with renowned brands likePhilips Hue,HEMAandRijksmuseum. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.

What to Expect?

✅ Challenges  Solutions: Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.
✅ Q42’s Perspective: Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.
✅ Live Demo: See how Elimity enables fast and efficient user access management without the complexity.

&#128467;️ Date: March 12th at 4:00 PM CET

Your Hosts?
Maarten Decat: VP Product and Co-Founder Elimity
Jasper Kaizer: Chief Operational Officer Q42

&#128640; Don’t miss out—register now to secure your spot!

</itunes:summary>
            <itunes:subtitle>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:04</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/why-did-q42-go-for-iso-27001"&gt;&lt;img src="http://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/standard/download-26-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=72fba439568130226ad1b3e02209afcc&amp;source=podcast&amp;photo%5fid=110976287" width="625" height="352" type="text/html" medium="video" duration="64" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/standard/download-26-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/standard/download-26-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/video_medium/what-were-q42s-identity-challenges-video.mp4?source=podcast" type="video/mp4" length="4811946"/>
            <title>What were Q42's Identity Challenges? </title>
            <link>http://videos.elimity.com/what-were-q42s-identity-challenges</link>
            <description>&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-were-q42s-identity-challenges"&gt;&lt;img src="http://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/110976280</guid>
            <pubDate>Wed, 19 Mar 2025 08:55:00 GMT</pubDate>
            <media:title>What were Q42's Identity Challenges? </media:title>
            <itunes:summary>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with renowned brands likePhilips Hue,HEMAandRijksmuseum. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.

What to Expect?

✅ Challenges  Solutions: Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.
✅ Q42’s Perspective: Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.
✅ Live Demo: See how Elimity enables fast and efficient user access management without the complexity.

&#128467;️ Date: March 12th at 4:00 PM CET

Your Hosts?
Maarten Decat: VP Product and Co-Founder Elimity
Jasper Kaizer: Chief Operational Officer Q42

&#128640; Don’t miss out—register now to secure your spot!

</itunes:summary>
            <itunes:subtitle>Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity
Join us for a session with our customerQ42. The strategic technology agency, part of the Nordic consultancy collectiveEidra,builds digital products with...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:45</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-were-q42s-identity-challenges"&gt;&lt;img src="http://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/standard/download-17-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=3eca7d7c1ded91417fef7f76525a7426&amp;source=podcast&amp;photo%5fid=110976280" width="625" height="352" type="text/html" medium="video" duration="105" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/standard/download-17-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/standard/download-17-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/video_medium/how-to-prove-that-you-are-in-1-video.mp4?source=podcast" type="video/mp4" length="27156778"/>
            <title>How to prove that you are in control</title>
            <link>http://videos.elimity.com/how-to-prove-that-you-are-in-1</link>
            <description>&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/how-to-prove-that-you-are-in-1"&gt;&lt;img src="http://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/109396985</guid>
            <pubDate>Thu, 30 Jan 2025 13:56:33 GMT</pubDate>
            <media:title>How to prove that you are in control</media:title>
            <itunes:summary></itunes:summary>
            <itunes:subtitle></itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>06:43</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/how-to-prove-that-you-are-in-1"&gt;&lt;img src="http://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=1cad2bbb74dd6fa233e37c9f63cbddeb&amp;source=podcast&amp;photo%5fid=109396985" width="625" height="352" type="text/html" medium="video" duration="403" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/video_medium/the-challenge-manual-access-reviews-video.mp4?source=podcast" type="video/mp4" length="1627402"/>
            <title>The Challenge: Manual Access Reviews</title>
            <link>http://videos.elimity.com/the-challenge-manual-access-reviews</link>
            <description>&lt;p&gt;In this short clip from our webinar “What is IGA Light”, Ivar Lyse (Customer Success at Cloudworks) highlights the biggest hurdles organisations face with access reviews:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1️⃣ Need for Access Reviews due to Compliance requirements (GXP, ISO27001)&lt;/p&gt;
&lt;p&gt;2️⃣ Self-developed Excel-based access reviews&lt;/p&gt;
&lt;p&gt;3️⃣ Extremely complex IAM landscape with multiple systems and directories&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Learn why these issues lead to inefficiencies, high costs, and increased risks—and how modern solutions can help.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-challenge-manual-access-reviews"&gt;&lt;img src="http://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/108652521</guid>
            <pubDate>Thu, 09 Jan 2025 10:34:30 GMT</pubDate>
            <media:title>The Challenge: Manual Access Reviews</media:title>
            <itunes:summary>In this short clip from our webinar “What is IGA Light”, Ivar Lyse (Customer Success at Cloudworks) highlights the biggest hurdles organisations face with access reviews:



1️⃣ Need for Access Reviews due to Compliance requirements (GXP, ISO27001)
2️⃣ Self-developed Excel-based access reviews
3️⃣ Extremely complex IAM landscape with multiple systems and directories



Learn why these issues lead to inefficiencies, high costs, and increased risks—and how modern solutions can help.</itunes:summary>
            <itunes:subtitle>In this short clip from our webinar “What is IGA Light”, Ivar Lyse (Customer Success at Cloudworks) highlights the biggest hurdles organisations face with access reviews:



1️⃣ Need for Access Reviews due to Compliance requirements (GXP,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:45</itunes:duration>
            <media:description type="html">&lt;p&gt;In this short clip from our webinar “What is IGA Light”, Ivar Lyse (Customer Success at Cloudworks) highlights the biggest hurdles organisations face with access reviews:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1️⃣ Need for Access Reviews due to Compliance requirements (GXP, ISO27001)&lt;/p&gt;
&lt;p&gt;2️⃣ Self-developed Excel-based access reviews&lt;/p&gt;
&lt;p&gt;3️⃣ Extremely complex IAM landscape with multiple systems and directories&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Learn why these issues lead to inefficiencies, high costs, and increased risks—and how modern solutions can help.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-challenge-manual-access-reviews"&gt;&lt;img src="http://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=67c8149f682d4e391f8b91afa7d501fe&amp;source=podcast&amp;photo%5fid=108652521" width="625" height="352" type="text/html" medium="video" duration="45" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/standard/download-15-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/standard/download-15-thumbnail.jpg/thumbnail.jpg"/>
            <category>Access Reviews</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/video_medium/elimity-on-kanaal-z-trends-video.mp4?source=podcast" type="video/mp4" length="8401467"/>
            <title>Elimity on Kanaal Z Trends</title>
            <link>http://videos.elimity.com/elimity-on-kanaal-z-trends</link>
            <description>&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Samenwerkingen met Cegeka zet turbo op expansie van Elimity&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Belgium, [October 29rd, 2024]&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;Sinds half oktober moeten Europese KMO’s en grote bedrijven in cruciale sectoren zich beter wapenen tegen cybercriminaliteit. De Vlaamse scale-up Elimity springt op de kar van die Europese NIS2-richtlijn. Het bedrijf ontwikkelde software voor het beheer van gebruikersaccounts. ICT-consultant Cegeka zet er mee z’n schouders onder?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The full interview:&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/"&gt;&lt;a href="https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/"&gt;https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/&lt;/a&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/elimity-on-kanaal-z-trends"&gt;&lt;img src="http://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/105813653</guid>
            <pubDate>Tue, 29 Oct 2024 11:33:54 GMT</pubDate>
            <media:title>Elimity on Kanaal Z Trends</media:title>
            <itunes:summary>Samenwerkingen met Cegeka zet turbo op expansie van Elimity

Belgium, [October 29rd, 2024] Sinds half oktober moeten Europese KMO’s en grote bedrijven in cruciale sectoren zich beter wapenen tegen cybercriminaliteit. De Vlaamse scale-up Elimity springt op de kar van die Europese NIS2-richtlijn. Het bedrijf ontwikkelde software voor het beheer van gebruikersaccounts. ICT-consultant Cegeka zet er mee z’n schouders onder?

The full interview:https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/


</itunes:summary>
            <itunes:subtitle>Samenwerkingen met Cegeka zet turbo op expansie van Elimity

Belgium, [October 29rd, 2024] Sinds half oktober moeten Europese KMO’s en grote bedrijven in cruciale sectoren zich beter wapenen tegen cybercriminaliteit. De Vlaamse scale-up Elimity...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:05</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;&lt;strong&gt;Samenwerkingen met Cegeka zet turbo op expansie van Elimity&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Belgium, [October 29rd, 2024]&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;Sinds half oktober moeten Europese KMO’s en grote bedrijven in cruciale sectoren zich beter wapenen tegen cybercriminaliteit. De Vlaamse scale-up Elimity springt op de kar van die Europese NIS2-richtlijn. Het bedrijf ontwikkelde software voor het beheer van gebruikersaccounts. ICT-consultant Cegeka zet er mee z’n schouders onder?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The full interview:&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/"&gt;&lt;a href="https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/"&gt;https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/&lt;/a&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/elimity-on-kanaal-z-trends"&gt;&lt;img src="http://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=590225621dafb96a7343729bddff5583&amp;source=podcast&amp;photo%5fid=105813653" width="625" height="328" type="text/html" medium="video" duration="125" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/video_medium/start-your-identity-security-video.mp4?source=podcast" type="video/mp4" length="2293139"/>
            <title>Start Your Identity Security Assessment with Elimity! </title>
            <link>http://videos.elimity.com/start-your-identity-security</link>
            <description>&lt;p&gt;&lt;h2&gt;Prove that you control your users and their access!&amp;nbsp;&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The NIS2-Directive requires you to prove that you are in control of your users and access. Get a one-time analysis of your users and their access within the the most crucial applications and become audit-ready!&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;u&gt;Start your identity security assessment today&lt;/u&gt;&lt;/a&gt;! &#128640;&lt;/p&gt;
&lt;img src="https://elimity.com/assessment" alt=""&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/start-your-identity-security"&gt;&lt;img src="http://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/standard/download-23-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/105248675</guid>
            <pubDate>Thu, 10 Oct 2024 14:02:05 GMT</pubDate>
            <media:title>Start Your Identity Security Assessment with Elimity! </media:title>
            <itunes:summary>Prove that you control your users and their access!
The NIS2-Directive requires you to prove that you are in control of your users and access. Get a one-time analysis of your users and their access within the the most crucial applications and become audit-ready!

Start your identity security assessment today! &#128640;
</itunes:summary>
            <itunes:subtitle>Prove that you control your users and their access!
The NIS2-Directive requires you to prove that you are in control of your users and access. Get a one-time analysis of your users and their access within the the most crucial applications and...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:28</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h2&gt;Prove that you control your users and their access!&amp;nbsp;&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The NIS2-Directive requires you to prove that you are in control of your users and access. Get a one-time analysis of your users and their access within the the most crucial applications and become audit-ready!&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;u&gt;Start your identity security assessment today&lt;/u&gt;&lt;/a&gt;! &#128640;&lt;/p&gt;
&lt;img src="https://elimity.com/assessment" alt=""&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/start-your-identity-security"&gt;&lt;img src="http://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/standard/download-23-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=2c3b0dce279140d34bb7af46ae4b7e42&amp;source=podcast&amp;photo%5fid=105248675" width="625" height="352" type="text/html" medium="video" duration="28" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/standard/download-23-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/standard/download-23-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/video_medium/nis2-sectors-v2-video.mp4?source=podcast" type="video/mp4" length="3631946"/>
            <title>NIS2: Sectors (V2)</title>
            <link>http://videos.elimity.com/nis2-sectors-v2</link>
            <description>&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-sectors-v2"&gt;&lt;img src="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102468999</guid>
            <pubDate>Thu, 27 Jun 2024 08:04:20 GMT</pubDate>
            <media:title>NIS2: Sectors (V2)</media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

✅ NIS2: Key Changes and Implications
✅ NIS2  IAM: Requirements Governance and Reporting
✅ Case Study: Achieving NIS2 Compliance with Limited Resources
✅ Solution: Lightweight Identity Governance
</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

✅ NIS2: Key Changes and Implications
✅ NIS2  IAM:...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:21</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-sectors-v2"&gt;&lt;img src="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=aa667fda2ac2d70206361b5c0a9df86a&amp;source=podcast&amp;photo%5fid=102468999" width="625" height="352" type="text/html" medium="video" duration="81" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/standard/download-15-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM</category>
            <category>NIS2</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/video_medium/nis2-session-what-to-expect-video.mp4?source=podcast" type="video/mp4" length="2206943"/>
            <title>NIS2-Session: What to Expect</title>
            <link>http://videos.elimity.com/nis2-session-what-to-expect</link>
            <description>&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-session-what-to-expect"&gt;&lt;img src="http://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/standard/download-13-thumbnail.jpg" width="75" height="75"/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102468516</guid>
            <pubDate>Thu, 27 Jun 2024 07:37:53 GMT</pubDate>
            <media:title>NIS2-Session: What to Expect</media:title>
            <itunes:summary>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:

✅ NIS2: Key Changes and Implications
✅ NIS2  IAM: Requirements Governance and Reporting
✅ Case Study: Achieving NIS2 Compliance with Limited Resources
✅ Solution: Lightweight Identity Governance

</itunes:summary>
            <itunes:subtitle>NIS2 requires you to be in control of all aspects of your cybersecurity.

With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.

On June 26th at 4:00 PM CET, the experts of...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:48</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/nis2-session-what-to-expect"&gt;&lt;img src="http://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/standard/download-13-thumbnail.jpg" width="75" height="75"/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=c7a11831db31e2ee065f1a6b53325e4b&amp;source=podcast&amp;photo%5fid=102468516" width="625" height="352" type="text/html" medium="video" duration="48" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/standard/download-13-thumbnail.jpg" width="75" height="75"/>
            <itunes:image href="http://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/video_medium/idata-driven-iam-the-3-main-video.mp4?source=podcast" type="video/mp4" length="4751527"/>
            <title>[IData-Driven IAM ] The 3 Main Challenges</title>
            <link>http://videos.elimity.com/idata-driven-iam-the-3-main</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Elimity and Indigo Consulting, we see a number of recurring challenges:&lt;/p&gt;
&lt;p&gt;1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.&lt;/p&gt;
&lt;p&gt;2️⃣ Siloed information: these identities are spread across many individual environments,&lt;br /&gt;
resulting into escalating costs.&lt;/p&gt;
&lt;p&gt;3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-the-3-main"&gt;&lt;img src="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142574</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[IData-Driven IAM ] The 3 Main Challenges</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
At Elimity and Indigo Consulting, we see a number of recurring challenges:
1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.
2️⃣ Siloed information: these identities are spread across many individual environments,
resulting into escalating costs.
3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:48</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Elimity and Indigo Consulting, we see a number of recurring challenges:&lt;/p&gt;
&lt;p&gt;1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.&lt;/p&gt;
&lt;p&gt;2️⃣ Siloed information: these identities are spread across many individual environments,&lt;br /&gt;
resulting into escalating costs.&lt;/p&gt;
&lt;p&gt;3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-the-3-main"&gt;&lt;img src="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=07e9f6f9460c51f7cf52de274ac71900&amp;source=podcast&amp;photo%5fid=102142574" width="625" height="352" type="text/html" medium="video" duration="108" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/video_medium/idata-driven-iam-identity-video.mp4?source=podcast" type="video/mp4" length="2975062"/>
            <title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</title>
            <link>http://videos.elimity.com/idata-driven-iam-identity</link>
            <description>&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142572</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</media:title>
            <itunes:summary>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.
And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.</itunes:summary>
            <itunes:subtitle>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.
In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:24</itunes:duration>
            <media:description type="html">&lt;p&gt;At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/idata-driven-iam-identity"&gt;&lt;img src="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=1f52db3930a592edce2689be8c554683&amp;source=podcast&amp;photo%5fid=102142572" width="625" height="352" type="text/html" medium="video" duration="84" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
            <category> CMMC etc.   However</category>
            <category>Data-Driven IAM</category>
            <category> especially with regulations such as NIS2</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
            <category> in practice we see a number of recurring challenges: identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud</category>
            <category> ISO27001</category>
            <category> IT and other technologies</category>
            <category> resulting into escalating costs  Resource scarcity: all while IAM resources and expertise are becoming more scarce.</category>
            <category> siloed information: these identities are spread across many individual environments</category>
            <category> SOC2</category>
            <category>The reason that we chose this topic is that securing access to data and applications has become a cornerstone of any modern cybersecurity strategy</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/video_medium/data-driven-iam-merger-and-video.mp4?source=podcast" type="video/mp4" length="1816417"/>
            <title>[Data-Driven IAM] Merger and Acquisition</title>
            <link>http://videos.elimity.com/data-driven-iam-merger-and</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-merger-and"&gt;&lt;img src="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142570</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[Data-Driven IAM] Merger and Acquisition</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:51</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-merger-and"&gt;&lt;img src="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=7a2664fd113d59b21679b2dfd3d687b9&amp;source=podcast&amp;photo%5fid=102142570" width="625" height="352" type="text/html" medium="video" duration="51" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>IGA</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/video_medium/data-driven-iam-start-your-iga-video.mp4?source=podcast" type="video/mp4" length="5337257"/>
            <title>[Data-Driven IAM] Start Your IGA Journey</title>
            <link>http://videos.elimity.com/data-driven-iam-start-your-iga</link>
            <description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-start-your-iga"&gt;&lt;img src="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/102142567</guid>
            <pubDate>Mon, 17 Jun 2024 09:23:54 GMT</pubDate>
            <media:title>[Data-Driven IAM] Start Your IGA Journey</media:title>
            <itunes:summary>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.
For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.</itunes:summary>
            <itunes:subtitle>Identity and access management (IAM) presents a complex challenge in the digital era.
Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:32</itunes:duration>
            <media:description type="html">&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/data-driven-iam-start-your-iga"&gt;&lt;img src="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=d92c0f224b4afb06bffe976a9067f55d&amp;source=podcast&amp;photo%5fid=102142567" width="625" height="352" type="text/html" medium="video" duration="152" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/standard/download-12-thumbnail.jpg/thumbnail.jpg"/>
            <category>Data-Driven IAM</category>
            <category>IAM</category>
            <category>Identity Analytics</category>
            <category>Lightweight Identity Governance</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/video_medium/prove-that-youre-in-control-of-your-video.mp4?source=podcast" type="video/mp4" length="27156778"/>
            <title>Prove That You're In Control of Your Users and Their Access</title>
            <link>http://videos.elimity.com/prove-that-youre-in-control-of-your</link>
            <description>&lt;p&gt;&lt;h1&gt;How to That You're In Control of Your Users and Their Access&lt;br&gt;&lt;/h1&gt;&lt;h2&gt;Problem&lt;/h2&gt;&lt;p&gt;Over the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting of large amounts of accounts and permissions.&lt;/p&gt;&lt;br&gt;
&lt;h2&gt;Objective&lt;/h2&gt;Having control over who can access which data in such an environment is crucial for privacy, compliance and protecting against cyber threats.&lt;br&gt;
&lt;br&gt;&lt;h2&gt;What to expect?&lt;/h2&gt;&lt;p&gt;
In this guide, we’ll give you an overview of eight categories of key identity indicators focused on showing that you’re in control.&lt;/p&gt;
&lt;p&gt;These categories have proven to be complete for the majority of the organizations that strive for effective identity management and want to avoid major security risks.&lt;/p&gt;&lt;h2&gt;Next Steps&lt;/h2&gt;Download the guide so you can get started today &#128073; &lt;a href="https://elimity.com/guide-on-how-to-prove-that-you-are-in-control"&gt;elimity.com/guide-on-how-to-prove-that-you-are-in-control&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/prove-that-youre-in-control-of-your"&gt;&lt;img src="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91836254</guid>
            <pubDate>Tue, 19 Dec 2023 09:52:14 GMT</pubDate>
            <media:title>Prove That You're In Control of Your Users and Their Access</media:title>
            <itunes:summary>How to That You're In Control of Your Users and Their AccessProblemOver the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting of large amounts of accounts and permissions.
ObjectiveHaving control over who can access which data in such an environment is crucial for privacy, compliance and protecting against cyber threats.
What to expect?
In this guide, we’ll give you an overview of eight categories of key identity indicators focused on showing that you’re in control.
These categories have proven to be complete for the majority of the organizations that strive for effective identity management and want to avoid major security risks.Next StepsDownload the guide so you can get started today &#128073; elimity.com/guide-on-how-to-prove-that-you-are-in-control</itunes:summary>
            <itunes:subtitle>How to That You're In Control of Your Users and Their AccessProblemOver the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>06:43</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h1&gt;How to That You're In Control of Your Users and Their Access&lt;br&gt;&lt;/h1&gt;&lt;h2&gt;Problem&lt;/h2&gt;&lt;p&gt;Over the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting of large amounts of accounts and permissions.&lt;/p&gt;&lt;br&gt;
&lt;h2&gt;Objective&lt;/h2&gt;Having control over who can access which data in such an environment is crucial for privacy, compliance and protecting against cyber threats.&lt;br&gt;
&lt;br&gt;&lt;h2&gt;What to expect?&lt;/h2&gt;&lt;p&gt;
In this guide, we’ll give you an overview of eight categories of key identity indicators focused on showing that you’re in control.&lt;/p&gt;
&lt;p&gt;These categories have proven to be complete for the majority of the organizations that strive for effective identity management and want to avoid major security risks.&lt;/p&gt;&lt;h2&gt;Next Steps&lt;/h2&gt;Download the guide so you can get started today &#128073; &lt;a href="https://elimity.com/guide-on-how-to-prove-that-you-are-in-control"&gt;elimity.com/guide-on-how-to-prove-that-you-are-in-control&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/prove-that-youre-in-control-of-your"&gt;&lt;img src="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=87250ecd355a9b189a391d4d7df8fa8a&amp;source=podcast&amp;photo%5fid=91836254" width="625" height="352" type="text/html" medium="video" duration="403" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/standard/download-9-thumbnail.jpg/thumbnail.jpg"/>
            <category>Cybersecurity</category>
            <category>IAM KPI</category>
            <category>Identity and Access Management</category>
            <category>Identity Governance</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/video_medium/the-8-challenges-of-fragmented-iam-video.mp4?source=podcast" type="video/mp4" length="3696926"/>
            <title>The 8 Challenges of Fragmented IAM Reporting</title>
            <link>http://videos.elimity.com/the-8-challenges-of-fragmented-iam</link>
            <description>&lt;p&gt;&lt;span&gt;Explore the challenges encountered by mature IAM teams despite effective governance processes. &lt;br&gt;&lt;br&gt;Maarten Decat, CEO and Co-Founder of Elimity,&amp;nbsp;highlights issues such as opaque approval processes, data quality challenges in IGA, high costs in RBAC deployment, and audit findings arising from disconnected critical systems.&lt;br&gt;&lt;br&gt;These hurdles underscore the need for solutions like Elimity Insights to address these IAM complexities.&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-8-challenges-of-fragmented-iam"&gt;&lt;img src="http://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/standard/download-20-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91407132</guid>
            <pubDate>Wed, 06 Dec 2023 14:01:34 GMT</pubDate>
            <media:title>The 8 Challenges of Fragmented IAM Reporting</media:title>
            <itunes:summary>Explore the challenges encountered by mature IAM teams despite effective governance processes. Maarten Decat, CEO and Co-Founder of Elimity,highlights issues such as opaque approval processes, data quality challenges in IGA, high costs in RBAC deployment, and audit findings arising from disconnected critical systems.These hurdles underscore the need for solutions like Elimity Insights to address these IAM complexities.</itunes:summary>
            <itunes:subtitle>Explore the challenges encountered by mature IAM teams despite effective governance processes. Maarten Decat, CEO and Co-Founder of Elimity,highlights issues such as opaque approval processes, data quality challenges in IGA, high costs in RBAC...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:15</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;span&gt;Explore the challenges encountered by mature IAM teams despite effective governance processes. &lt;br&gt;&lt;br&gt;Maarten Decat, CEO and Co-Founder of Elimity,&amp;nbsp;highlights issues such as opaque approval processes, data quality challenges in IGA, high costs in RBAC deployment, and audit findings arising from disconnected critical systems.&lt;br&gt;&lt;br&gt;These hurdles underscore the need for solutions like Elimity Insights to address these IAM complexities.&lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/the-8-challenges-of-fragmented-iam"&gt;&lt;img src="http://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/standard/download-20-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=66b3d67e2502b8406f345a9d2c85b24e&amp;source=podcast&amp;photo%5fid=91407132" width="625" height="352" type="text/html" medium="video" duration="75" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/standard/download-20-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/standard/download-20-thumbnail.jpg/thumbnail.jpg"/>
            <category>IAM Reporting</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/video_medium/what-is-fragmented-iam-reporting-video.mp4?source=podcast" type="video/mp4" length="4944436"/>
            <title>What is Fragmented IAM Reporting?</title>
            <link>http://videos.elimity.com/what-is-fragmented-iam-reporting</link>
            <description>&lt;p&gt;&lt;span&gt;Discover the limitations of traditional IAM reporting methods, including reliance on pre-built reports, Excel sheets, and manual data interpretation, leading to inefficiencies and outdated insights.&lt;br&gt;&lt;br&gt;Maarten Decat, CEO and Co-Founder of Elimity, explains you about the attempts by advanced IAM teams to address these issues through data lakes and analytics tools but encountering limitations in scalability and cost-effectiveness. &lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-is-fragmented-iam-reporting"&gt;&lt;img src="http://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91407117</guid>
            <pubDate>Wed, 06 Dec 2023 14:01:34 GMT</pubDate>
            <media:title>What is Fragmented IAM Reporting?</media:title>
            <itunes:summary>Discover the limitations of traditional IAM reporting methods, including reliance on pre-built reports, Excel sheets, and manual data interpretation, leading to inefficiencies and outdated insights.Maarten Decat, CEO and Co-Founder of Elimity, explains you about the attempts by advanced IAM teams to address these issues through data lakes and analytics tools but encountering limitations in scalability and cost-effectiveness. </itunes:summary>
            <itunes:subtitle>Discover the limitations of traditional IAM reporting methods, including reliance on pre-built reports, Excel sheets, and manual data interpretation, leading to inefficiencies and outdated insights.Maarten Decat, CEO and Co-Founder of Elimity,...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:23</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;span&gt;Discover the limitations of traditional IAM reporting methods, including reliance on pre-built reports, Excel sheets, and manual data interpretation, leading to inefficiencies and outdated insights.&lt;br&gt;&lt;br&gt;Maarten Decat, CEO and Co-Founder of Elimity, explains you about the attempts by advanced IAM teams to address these issues through data lakes and analytics tools but encountering limitations in scalability and cost-effectiveness. &lt;/span&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/what-is-fragmented-iam-reporting"&gt;&lt;img src="http://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/standard/download-14-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=d785d0384a443ed9f804b02a8cc71139&amp;source=podcast&amp;photo%5fid=91407117" width="625" height="352" type="text/html" medium="video" duration="83" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/standard/download-14-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/standard/download-14-thumbnail.jpg/thumbnail.jpg"/>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/video_medium/customer-case-pharma-company-needs-video.mp4?source=podcast" type="video/mp4" length="4733445"/>
            <title>[Customer Case] Pharma Company Needs IAM Visibility</title>
            <link>http://videos.elimity.com/customer-case-pharma-company-needs</link>
            <description>&lt;p&gt;&lt;span&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Global BioPharma Company&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Active in 40 countries worldwide&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;About 10k users&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Big SAP Landscape&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IGA in place for 5+ years&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting required which is not available out of the box. On top of that, many systems were still not connected to SAP, and unstructured data has been neglected. &lt;/p&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-pharma-company-needs"&gt;&lt;img src="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91299554</guid>
            <pubDate>Mon, 04 Dec 2023 12:32:36 GMT</pubDate>
            <media:title>[Customer Case] Pharma Company Needs IAM Visibility</media:title>
            <itunes:summary>Customer Profile &#128064;Global BioPharma CompanyActive in 40 countries worldwideAbout 10k usersBig SAP LandscapeIGA in place for 5+ yearsChallengesA global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting required which is not available out of the box. On top of that, many systems were still not connected to SAP, and unstructured data has been neglected. </itunes:summary>
            <itunes:subtitle>Customer Profile &#128064;Global BioPharma CompanyActive in 40 countries worldwideAbout 10k usersBig SAP LandscapeIGA in place for 5+ yearsChallengesA global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:51</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;span&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Global BioPharma Company&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Active in 40 countries worldwide&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;About 10k users&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Big SAP Landscape&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IGA in place for 5+ years&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting required which is not available out of the box. On top of that, many systems were still not connected to SAP, and unstructured data has been neglected. &lt;/p&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-pharma-company-needs"&gt;&lt;img src="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=2e08692333732c09eb883a0a9e2a8898&amp;source=podcast&amp;photo%5fid=91299554" width="625" height="352" type="text/html" medium="video" duration="111" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/standard/download-13-thumbnail.jpg/thumbnail.jpg"/>
            <category>identity data analytics</category>
            <category>iga</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/video_medium/customer-case-retail-has-complex-video.mp4?source=podcast" type="video/mp4" length="3539164"/>
            <title>[Customer Case] Retail Has Complex IAM Landscape</title>
            <link>http://videos.elimity.com/customer-case-retail-has-complex</link>
            <description>&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;u&gt;&lt;/u&gt;Multinational Retail Company&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Active Worldwide&lt;/li&gt;&lt;li&gt;About 400k Users&lt;/li&gt;&lt;li&gt;Extremely Complex IAM landscape with multiple HR systems, domains, directories and IGAs&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;span&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.&lt;br&gt;&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-retail-has-complex"&gt;&lt;img src="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91299556</guid>
            <pubDate>Mon, 04 Dec 2023 12:28:26 GMT</pubDate>
            <media:title>[Customer Case] Retail Has Complex IAM Landscape</media:title>
            <itunes:summary>Customer Profile &#128064;Multinational Retail CompanyActive WorldwideAbout 400k UsersExtremely Complex IAM landscape with multiple HR systems, domains, directories and IGAsChallengesA multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.</itunes:summary>
            <itunes:subtitle>Customer Profile &#128064;Multinational Retail CompanyActive WorldwideAbout 400k UsersExtremely Complex IAM landscape with multiple HR systems, domains, directories and IGAsChallengesA multinational retail company has multiple identity systems which have...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>01:15</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;u&gt;&lt;/u&gt;Multinational Retail Company&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Active Worldwide&lt;/li&gt;&lt;li&gt;About 400k Users&lt;/li&gt;&lt;li&gt;Extremely Complex IAM landscape with multiple HR systems, domains, directories and IGAs&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;span&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.&lt;br&gt;&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-retail-has-complex"&gt;&lt;img src="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=c471ebf3f4a1fa8ce8d45f35c3cea52a&amp;source=podcast&amp;photo%5fid=91299556" width="625" height="352" type="text/html" medium="video" duration="75" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/standard/download-32-thumbnail.jpg/thumbnail.jpg"/>
            <category>identity data analytics</category>
            <category>iga</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/video_medium/customer-case-fortune-500-bank-video.mp4?source=podcast" type="video/mp4" length="8830529"/>
            <title>[Customer Case] Fortune-500 Bank Needs IAM insights at scale</title>
            <link>http://videos.elimity.com/customer-case-fortune-500-bank</link>
            <description>&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;u&gt;&lt;/u&gt;Fortune-500 bank&lt;/li&gt;&lt;li&gt;About 35k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (+5 Years)&lt;/li&gt;&lt;/ul&gt;AND&lt;br&gt;&lt;ul&gt;&lt;li&gt;European Bank&lt;/li&gt;&lt;li&gt;About 6k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (5+ Years)&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;span&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.Fortune-500 bank has a mature IGA deployment with many systems connected and much data present, but many users still have not received the information they need.&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;System owners: who can access my application?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IAM expert: what should I put in a role for team X?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Security experts: orphaned accounts?&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The IAM Team attempted to report through its current IGA, Excel sheets or PowerBI. But this resulted in a large CTO for reporting (many people involved, lots of time wasted) and overly high cyber risks.&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-fortune-500-bank"&gt;&lt;img src="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91299546</guid>
            <pubDate>Mon, 04 Dec 2023 12:19:15 GMT</pubDate>
            <media:title>[Customer Case] Fortune-500 Bank Needs IAM insights at scale</media:title>
            <itunes:summary>Customer Profile &#128064;Fortune-500 bankAbout 35k EmployeesHighly Mature IGA Deployment (+5 Years)ANDEuropean BankAbout 6k EmployeesHighly Mature IGA Deployment (5+ Years)ChallengesA multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.Fortune-500 bank has a mature IGA deployment with many systems connected and much data present, but many users still have not received the information they need.System owners: who can access my application?IAM expert: what should I put in a role for team X?Security experts: orphaned accounts?The IAM Team attempted to report through its current IGA, Excel sheets or PowerBI. But this resulted in a large CTO for reporting (many people involved, lots of time wasted) and overly high cyber risks.</itunes:summary>
            <itunes:subtitle>Customer Profile &#128064;Fortune-500 bankAbout 35k EmployeesHighly Mature IGA Deployment (+5 Years)ANDEuropean BankAbout 6k EmployeesHighly Mature IGA Deployment (5+ Years)ChallengesA multinational retail company has multiple identity systems which have...</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>02:51</itunes:duration>
            <media:description type="html">&lt;p&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;u&gt;&lt;/u&gt;Fortune-500 bank&lt;/li&gt;&lt;li&gt;About 35k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (+5 Years)&lt;/li&gt;&lt;/ul&gt;AND&lt;br&gt;&lt;ul&gt;&lt;li&gt;European Bank&lt;/li&gt;&lt;li&gt;About 6k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (5+ Years)&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;span&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.Fortune-500 bank has a mature IGA deployment with many systems connected and much data present, but many users still have not received the information they need.&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;System owners: who can access my application?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IAM expert: what should I put in a role for team X?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Security experts: orphaned accounts?&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The IAM Team attempted to report through its current IGA, Excel sheets or PowerBI. But this resulted in a large CTO for reporting (many people involved, lots of time wasted) and overly high cyber risks.&lt;/p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/customer-case-fortune-500-bank"&gt;&lt;img src="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=0598ccd6279e364a1ed33a2c5ae7f384&amp;source=podcast&amp;photo%5fid=91299546" width="625" height="352" type="text/html" medium="video" duration="171" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/standard/download-44-thumbnail.jpg/thumbnail.jpg"/>
            <category>identity data analytics</category>
            <category>iga</category>
        </item>
        <item>
            <enclosure url="http://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/video_medium/how-to-prove-that-you-are-in-video.mp4?source=podcast" type="video/mp4" length="1227122"/>
            <title>How To Prove That You Are In Control of Users and Their Access?</title>
            <link>http://videos.elimity.com/how-to-prove-that-you-are-in</link>
            <description>&lt;p&gt;As security team it is essential to show the management that you are in control of your employees and their access to valuable data.&lt;/p&gt;
&lt;p&gt;Learn how you can prove control in this short tutorial video! &#128249;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/how-to-prove-that-you-are-in"&gt;&lt;img src="http://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://videos.elimity.com/photo/91182072</guid>
            <pubDate>Wed, 29 Nov 2023 15:15:34 GMT</pubDate>
            <media:title>How To Prove That You Are In Control of Users and Their Access?</media:title>
            <itunes:summary>As security team it is essential to show the management that you are in control of your employees and their access to valuable data.
Learn how you can prove control in this short tutorial video! &#128249;</itunes:summary>
            <itunes:subtitle>As security team it is essential to show the management that you are in control of your employees and their access to valuable data.
Learn how you can prove control in this short tutorial video! &#128249;</itunes:subtitle>
            <itunes:author>Elimity</itunes:author>
            <itunes:duration>00:22</itunes:duration>
            <media:description type="html">&lt;p&gt;As security team it is essential to show the management that you are in control of your employees and their access to valuable data.&lt;/p&gt;
&lt;p&gt;Learn how you can prove control in this short tutorial video! &#128249;&lt;/p&gt;&lt;p&gt;&lt;a href="http://videos.elimity.com/how-to-prove-that-you-are-in"&gt;&lt;img src="http://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/standard/download-9-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://videos.elimity.com/v.ihtml/player.html?token=8f6efcb32ab35cb480acfd0a55a7cb3b&amp;source=podcast&amp;photo%5fid=91182072" width="625" height="352" type="text/html" medium="video" duration="22" isDefault="true" expression="full"/>
            <media:thumbnail url="http://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/standard/download-9-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/standard/download-9-thumbnail.jpg/thumbnail.jpg"/>
            <category>Tuturial</category>
            <category>User Access</category>
        </item>
    </channel>
</rss>
