The Future of Authentication and Authorization
- LANGUAGE: English DATE: Tuesday, July 23, 2013 TIME: 4:00pm CEST, 10:00am EDT, 2:00pm GMT
Clearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. However, just talking about multi-factor authentication and password vaults is not sufficient. What organizations should evaluate are versatile authentication and, as the next and logical step, context- and risk-based authentication and authorization. That is the real trend. In this webinar, KuppingerCole Senior Analyst Dave Kearns will talk about the bigger picture on the future of authentication and authorization.
Continuing Education Credits
After attending this webinar you will be able to:
- List the important approaches to consider when looking at the future of authentication and authorization in your organization.
- Describe the concepts of Versatile Authentication, Risk- and Context-Based Authentication and explain why these are important.
- How Access Control combines the elements of Authorization and Authentication *Explain traditional authentication methods, how they combine in multi-factor ceremonies and how they connect to the future of Authentication as part of a context-based access control scheme
This event qualifies for 1 Group Internet Based CPE
Prerequisites: None Advance Preparation: None Learning Level: Intermediate Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: email@example.com
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.