NEXIS 4 | Expert Sessions | Schulung | Seminar

We love to share our knowledge

IT security and Access Governance are more than just a painful necessity – we believe that they can be a driving force behind companies’ success. In our free Expert Sessions, we therefore bring industry experts together to exchange best practices, innovations, and customer experiences.

Within our 45-minute live sessions, we highlight various topics using clear examples, customer experiences, or partner presentations. Save your place in our upcoming webinars today!

Expert Sessions

Manageable access governance in practice
                                        Date: 21.07.2022 | 11:00 AM

Access governance is a major challenge for many companies. In particular, practical manageability and understanding in the business departments are important in order to keep costs low and still ensure a high level of security. In this expert session, we will focus on how business departments can be integrated easily and with lean governance processes.

register now

Role Modeling in NEXIS 4 with the Latest Identity Grid features
Date: 20.10.2022 | 11:00 AM

Role modeling processes by IT and business departments become complex and confusing over time. This Expert Session shows how to use the latest features of the the NEXIS 4 Identity Grid in order to quickly achieve a suitable, lean role model. In addition, the handling of entitlement hierarchies and existing roles is discussed.

register now

Expert Sessions

Missed an Expert Session? You will receive our recording of the Expert Session “on demand” via E-Mail.

Successful Identity & Access Governance Workflows in practiceDate: 19.05.2022

In practice, coherent and lean analytics and governance workflows are one of the central components for successful company-wide identity management. In this Expert Session, we highlight how workflows can be easily configured with NEXIS 4 and discuss best practice designs for the various end-user interfaces for different stakeholder groups. Core elements of workflows and supplementary components (i.e. trigger, escalations, mailings and scripts) will be highlighted from a practical point of view.


Access Cleansing with Minimized Efforts                            Date: 24.03.2022

Historical entitlement structures can impose severe security risks as employees have excessive and unneeded access. In order to restore compliance and simplify entitlement and role management, we show you how an efficient and longterm cleansing process of complex and grown entitlement structures can take place.


Automated user and role recertifications Customer report by A1 Telekom Austria                           
Date: 24.02.2022

Have you also experienced them as a cost driver that also leads to a lot of resentment in the business departments? Periodic and event-related recertifications of employees, entitlements, and roles can be cumbersome, complex, and hardly manageable. In this session, we would like to show you how to simplify and automize recertifications and save your end users a lot of frustration.


Time-based Role Analytics
                                        Date: 27.01.2022

Analysis of data taking into account the factor "time" in authorization and role management, as well as presentation of practice-relevant solutions with the help of NEXIS 4 using 3 use cases
Use Case 1: Identification of obsolete or future authorization assignments to business roles
Use Case 2: Search for a successor when an employee leaves to hand over responsibilities (e.g. for business roles)
Use Case 3: Flexibly configurable dashboards for responsible parties to keep track of items that are expiring or becoming invalid.


Smart IGA: Identity Analytics and Role Mining by One Identity & NexisDate: 29.04.2021


  • Presentation of interactive visualization and analysis functions of NEXIS 4 for better understanding of the respective specialist department
  • Use of recommendation algorithms for role candidates in NEXIS 4
  • Easily deploy of role candidates to One Identity Manager for subsequent approval workflows
  • Introduction and implementation of completed roles by One Identity Manager