{"id":3124,"date":"2019-07-04T16:34:58","date_gmt":"2019-07-04T14:34:58","guid":{"rendered":"https:\/\/relnet.hu\/?post_type=tribe_events&#038;p=3124"},"modified":"2019-07-04T16:53:37","modified_gmt":"2019-07-04T14:53:37","slug":"the-evolution-of-3rd-party-access-four-use-cases","status":"publish","type":"tribe_events","link":"https:\/\/relnet.hu\/en\/rendezveny\/the-evolution-of-3rd-party-access-four-use-cases\/","title":{"rendered":"The evolution of 3rd party access \u2013 four use cases"},"content":{"rendered":"<div><strong>Benchmark how industry leaders manage 3rd party access and identities!<\/strong><\/div>\n<div>Sign up now for our joint presentation with Ubisecure and listen when convenient for you:<\/div>\n<div>3rd parties constantly access your mission-critical data.<\/div>\n<div>\nIs your privileged access lifecycle streamlined, controlled and secure in the era of the cloud?<\/div>\n<div>\nUbisecure and SSH.COM discuss how cloudification has changed the rules of mission-critical access.<\/div>\n<div>Explore how business is driving the urgent need to open 3rd party access<\/div>\n<div>\n<p><span style=\"font-size: 10.5pt; line-height: 107%; font-family: 'Arial',sans-serif; color: #222222; background: white;\"><hr class=\" hr_color\" style=\"margin:0 auto 30px;\"\/>\n<\/span><\/p>\n<\/div>\n<div>Learn how to securely and cost-effectively handle temporary access to critical systems and data<\/div>\n<div>\u00a0<\/div>\n<div>Register now!<\/div>\n<div>\u00a0<\/div>\n<div>\n<p><span style=\"font-size: 10.5pt; line-height: 107%; font-family: '&amp;quot',serif; color: #222222;\"><a class=\"button  button_size_2\" href=\"\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISTER<\/span><\/a>\n<\/span><\/p>\n<\/div>\n<div>\u00a0<\/div>\n<div>\u00a0<\/div>\n<div>\u00a0<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to securely and cost-effectively handle temporary access to critical systems and data.<\/p>\n","protected":false},"author":1086,"featured_media":3116,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[350,486,480],"tribe_events_cat":[34,35,246,46,258],"yst_prominent_words":[],"class_list":["post-3124","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tag-aws-en","tag-cybersecurity-en","tag-multicloud-en","tribe_events_cat-enduser","tribe_events_cat-reseller","tribe_events_cat-ssh-en","tribe_events_cat-vendor","tribe_events_cat-webinar","cat_enduser","cat_reseller","cat_ssh-en","cat_vendor","cat_webinar"],"_links":{"self":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events\/3124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/users\/1086"}],"replies":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/comments?post=3124"}],"version-history":[{"count":0,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events\/3124\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media\/3116"}],"wp:attachment":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media?parent=3124"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tags?post=3124"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events_cat?post=3124"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/yst_prominent_words?post=3124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}