Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Setup WordPress Employee Directory with Active Directory (AD/LDAP) Search

Looking for a simple way to create an Employee Directory in WordPress using your Active Directory (AD) / LDAP? In this demo video, we’ll walk you through the complete setup of the WordPress LDAP Directory Search Plugin — making it easy to search, filter, and display employee details from your LDAP/AD server directly inside your WordPress site.

Advanced Sync Plugin Setup & Demo | Sync Active Directory (LDAP) Users with WordPress

Want to easily sync your LDAP/Active Directory users with WordPress? To show how simple it is to integrate WordPress with Active Directory in a few simple steps, we'll take you through the entire Advanced Sync Plugin setup process in this video, complete with a demo.

Drupal Session Management - User Session History

In this video, we walk you through the User Session History feature in the Drupal Session Management module. This feature allows users to view their session history, showing when and where they logged in. It also helps users identify any suspicious activity and take action if needed, enhancing account security and transparency. Comprehensive Documentation.

SailPoint AI-Driven Identity Governance: Access Modeling

Join Xalient experts Dave Cox, VP of Identity Services, Ryan Cluff, Director - IGA Practice and Kevin Bender, Senior Manager - IGA Practice, as they dive into the challenges of role-based access control (RBAC) and how to effectively use SailPoint’s AI Access Modeling to build, refine, and govern role models at scale. Learn how organizations can avoid stale role definitions and adopt sustainable, data-driven approaches.

EP 16 - Sensing the signals: The hidden risks in digital supply chains

Modern digital supply chains are increasingly complex and vulnerable. In this episode of Security Matters, host David Puner is joined by Retsef Levi, professor of operations management at the MIT Sloan School of Management, to explore how organizations can “sense the signals” of hidden risks lurking within their software supply chains, from open source dependencies to third-party integrations and AI-driven automation.

EP 16 - Sensing the signals: The hidden risks in digital supply chains

Modern digital supply chains are increasingly complex and vulnerable. Professor Levi, a leading expert in cyber resilience and complex systems, explains why traditional prevention isn’t enough and how attackers exploit unseen pathways to infiltrate even the most secure enterprises. The conversation covers the critical need for transparency, continuous monitoring, and rapid detection and recovery in an era where software is built from countless unknown components.

Eliminating Privileged Access Toil with Infrastructure Identity

Modern infrastructure is dynamic, ephemeral, and complex, with new technology (such as agentic AI) constantly being added. However, disjointed and unsecured AI and human identities introduce risk through social engineering, credential theft, and prompt hacking, as well as complexity and toil for engineering teams.

Is SailPoint's NERM the Right Tool for Managing your Non-Employee Identities?

In this video, Dave Cox, VP of Identity Services and Ryan Cluff, Director, IGA Practice at Xalient, dive into how organizations are using SailPoint's Non-Employee Resource Management (NERM) module to better manage contractors and vendors. We also explore how managed services in the identity space are evolving, especially with platforms like SailPoint.