Beyond Usernames and Passwords: 3 Steps to Modern Authentication

  • LANGUAGE: English DATE: Thursday, November 10, 2016 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
Beyond Usernames and Passwords: 3 Steps to Modern Authentication
There are three simple steps for moving to modern, more secure authentication. Make it convenient. Make it smart. Make it mobile.

This webinar will explain how establishing modern authentication is not a rocket science. It is a matter of choosing the right approach and the right tools. It is about Adaptive Authentication.

Adaptive Authentication tailors to what the users want (convenience) and prefer to use (mobile) – all the while adapting appropriately to access risk (smart), by balancing authentication strength with risk information. Today, we find both stand-alone solutions for Adaptive Authentication and integrated solutions, e.g. as part of Web Access Management and Federation tools.

In this KuppingerCole webinar, you will learn about

  • The three steps for moving to a modern, more secure authentication
  • Adaptive Authentication explained
  • The challenges and pitfalls of Adaptive Authentication
  • How to do it in practice: Moving towards Adaptive Authentication

In the first part, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will dive into the details of Adaptive Authentication - What makes authentication adaptive? How can you enable it in your existing infrastructure, based on existing or new tools? He also will look at the broader consumer world and the role Adaptive Authentication plays therein.

In the second part, Brian Mulligan, IBM Offering Manager for Access Management and Directory, will share IBM’s point of view, latest offerings, and projections in the authentication space.


Speakers

Brian Mulligan leads offering management for IBM Security’s access and directory products. In this role, Brian works in conjunction with the development, sales, marketing and support organizations to build and market innovative user-centric access security solutions. Previously, Brian...


Lead Sponsor

Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security. 

Watch now

Downloads

Webinar Presentation, KuppingerCole

Webinar Presentation, IBM

Webcast download

Popular Webcasts

Next Webinar

Webinar

Privileged Access Management - the Focal Point for Your IAM Today

PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today. 

Next Conference

Congress

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00