From local development to production, 1Password SDKs are an easy and secure way to work with secrets in your application.
The open source SDK libraries for Python, Javascript, and Go enable tight integration with 1Password while preserving end-to-end encryption for your API keys, tokens, and other credentials.
Developers can use 1Password SDKs for secrets management, or integrate 1Password item management into their applications and services.
Featured Speakers:
Simon Barendse
Engineering Team Lead,
1Password
Julia Ritter
Developer Community Manager,
1Password
In today’s hybrid work environment, creating a bring- your-own-device (BYOD) policy is more critical and top of mind than ever before. The question is, how do you build a secure framework and policies that accommodate a flexible workforce, while also ensuring compliance across all devices?
Join us on demand where we explore the key components of a robust BYOD policy as well as share insights on best practices for policy creation, stakeholder buy-in and implementation strategies.
Featured Speakers:
Emily Hill
Customer Success, 1Password
Jen Smeriglio
Senior Solutions Engineer,
1Password
On Demand Webinar
Every security team knows that few things are as critical to protect as data. This is especially true when it’s healthcare data and your team is distributed across two countries.
When the team at Synex Medical began an initiative to improve cybersecurity, they knew they had to start by securing every employee at every point of access, regardless of location or device used.
Featured Speakers:
Lee Jon Scramstad
Systems Architect, Synex Medical
On Demand Webinar
Every security team knows that few things are as critical to protect as data. This is especially true when it’s healthcare data and your team is distributed across two countries.
When the team at Synex Medical began an initiative to improve cybersecurity, they knew they had to start by securing every employee at every point of access, regardless of location or device used.
Featured Speakers:
Lee Jon Scramstad
Systems Architect, Synex Medical
On Demand Webinar
From hardware to applications, data, security, compliance, and more – IT teams are responsible for a lot. And if that wasn’t enough, you’re also responsible for ensuring business operations run smoothly and securely without impeding employee productivity.
Like IT teams, employees are focused on getting their jobs done. Sometimes this means they circumvent security policies to complete a task and unknowingly introduce information security risks. But keeping your team productive and secure doesn’t have to be a “one or the other” option.
Featured Speakers:
Alexander Pierpoint
Solutions Engineer,
1Password
On Demand Webinar
Improve your security posture and enjoy peace of mind with 1Password Extended Access Management (XAM). With our enterprise password manager and Device Trust products, you can protect your organization’s most sensitive applications and data. Join us for our upcoming webinar to see the platform’s many features in action. You’ll learn how to use it both effectively and safely, and how to maximize security and productivity in the process.
Featured Speakers:
Alexander Pierpoint
Solutions Engineer, 1Password
On Demand Webinar
Every business shares secrets. Whether it’s internal or external, there’s always sensitive information exchanging hands. And in the rush to collaborate and get work done quickly, insecure sharing can sometimes become the default option.
This was the case for Pathify – a remote-first company that creates customizable dashboards for higher education institutions. Pathify was growing fast. That was great for business, but it came with the challenge of sharing information both quickly and securely. With 1Password, securing their company came with the added benefit of boosting productivity.
Featured Speakers:
Nicole Robertson
Enterprise Architect & Security Officer,
Pathify
On Demand Webinar
You can’t ban shadow IT. Heck, a lot of times you can’t even see shadow IT apps. But you certainly can’t ignore them, either. So what does a security team do about shadow IT? How do you secure the devices and apps that workers use without the oversight – or even knowledge – of IT?
How do you manage the unmanageable?
Securing shadow IT starts with embracing it. To do that, companies need to understand why everyone’s using it in the first place.
Featured Speakers:
Marc von Mandel
Director, Solutions & Channel Product Marketing,
1Password
On Demand Webinar
Hybrid and remote work requires IT and Security teams to secure every sign-in and every employee identity.
But what about devices? How do you make sure every device accessing company resources is trustworthy?
Organizations struggle to maintain visibility into all the devices their employees use to get work done. Mobile Device Management (MDM) solutions can help, but they often fall short of ensuring the health and security of the devices they manage, and they don’t cover personal phones and laptops used for work by employees.
Featured Speakers:
Steve Won
Chief Product Officer, 1Password
Jason Meller
VP of Product,
1Password
On Demand Webinar
Authentication isn’t just a topic for security folks – it’s critical for business leaders to understand how improving the sign-in experience can boost revenue. For example, one in four online shoppers are willing to abandon a cart of $100+ if they had to reset their password to check out. The way your customers sign in to your site or app may have a significant impact on your bottom line. Learn how eliminating the friction caused by traditional passwords can significantly accelerate your funnel metrics, ensuring a smooth buying journey for your customers.
Featured Speakers:
Anna Pobletts
Head of Passwordless,
1Password
Cole Hecht
Director of Engineering, 1Password
Micah Neidhart
Product Marketing Manager,
1Password
On Demand Webinar
How certain are you that every device accessing your sensitive company resources is up-to-date and compliant with security policies? Establishing device health before authentication can significantly improve your security posture, but it requires enlisting the help of employees to go beyond traditional identity and access management.
1Password solves this challenge by letting you set policies that devices must meet before getting access to specific applications. Employees are gently guided to help resolve issues, ensuring they’re able to access the tools they need.
Featured Speakers:
Jason Meller
VP of Product,
1Password
Harry Robinson
Head of Sales,
1Password
On Demand Webinar
With remote work, bring-your-own (BYO) device policies, and cloud-based apps becoming commonplace, employees are increasingly working on devices that are outside of traditional corporate management. Modern IT and Security teams need to make sure that every device accessing sensitive data is known (meaning it doesn’t belong to a bad actor) and secure (meaning it is in a secure, compliant state).
You’ll receive a recording of the demo as soon as you register.
Featured Speakers:
Harry Robinson
Head of Sales,
1Password