Managing Risk through Cloud App Authentication and 360° Control
- LANGUAGE: English DATE: Thursday, June 23, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations in the areas of security and compliance. Employees and associates can use their personal cloud services to perform their jobs without reference to their employer. Line of business managers can acquire cloud services without performing risk assessment or considering the impact of these on compliance. To compound the problem mobile devices can be used to access these services from outside of the organizational perimeter anytime and anywhere.
A new service brings together web, email and cloud application control in one dashboard and gives organizations the ability to flexibly apply policies and protection according to individual users, where they are, what device they are using, the application they are accessing, and even according to their function within that application that they wish to use and the data they want to access.
This KuppingerCole webinar will cover the topics
- Secure use of mobile devices
- Controlling access to various cloud services
- Protecting sensitive data
- Ensuring compliance
- Avoiding Shadow IT
In the first part of this webinar Mike Small, Senior Analyst at KuppingerCole, will describe the challenges that organizations face that include balancing the need to liberate and enable users to do their jobs, and the need to apply sensible controls to ensure compliance and the security of sensitive data. He will summarize the steps that organizations need to take.
In the second part David Hald, CTO at CensorNet, will introduce a unified security solution that enables web, email and cloud application control in a single dashboard. Companies can see all cloud applications in use over their own network and by whom they are deployed. That gives them full control and also help to avoid shadow IT.
Passwords are quickly and easily compromised, they are costly and difficult to manage, and they result in poor user experiences. Many organizations are looking for alternatives, but find it challenging to identify appropriate passwordless and phishing resistant authentication solutions that are simple, effective, and secure.