Mitigate Identity-Related Breaches in the Era of Digital Transformation
- LANGUAGE: English DATE: Thursday, March 21, 2019 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.
This Webinar covers the following topics:
- An overview and methodology of KuppingerCole Leadership Compass for Adaptive Authentication.
- How Adaptive Authentication can enable your business and protect against identity-related breaches.
- How IT security professionals can make better access decisions, maximize security, and improve user experience.
In this KuppingerCole webinar, John Tolbert, Lead Analyst, will describe the concept of adaptive authentication. He will also discuss the KuppingerCole Leadership Compass for Adaptive Authentication and the criteria used for analyzing vendor products and services.
In the second part, Stephen Cox, Vice President and Chief Security Architect at SecureAuth, will discuss the importance of risk analysis and adaptive authentication in identity security and the future of access control in the era of digital transformation.
8845 Irvine Center Drive • CA 92618 Irvine • USA
Phone: +1 949 777 6959
SecureAuth is an identity security company that enables the most secure and flexible authentication experience for employees, partners and customers. Delivered as a service and deployed across cloud, hybrid and on-premises environments, SecureAuth manages and protects access to applications, systems and data at scale, anywhere in the world. The company provides the tools to build identity security into new and existing applications and workflows without impacting user experience or engagement, resulting in increased productivity and reduced risk.
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.