Mitigate Identity-Related Breaches in the Era of Digital Transformation

  • LANGUAGE: English DATE: Thursday, March 21, 2019 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
Upcoming Webinars
Mitigate Identity-Related Breaches in the Era of Digital Transformation

Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.

This Webinar covers the following topics:

  • An overview and methodology of KuppingerCole Leadership Compass for Adaptive Authentication.
  • How Adaptive Authentication can enable your business and protect against identity-related breaches.
  • How IT security professionals can make better access decisions, maximize security, and improve user experience.

In this KuppingerCole webinar, John Tolbert, Lead Analyst, will describe the concept of adaptive authentication. He will also discuss the KuppingerCole Leadership Compass for Adaptive Authentication and the criteria used for analyzing vendor products and services.

In the second part, Stephen Cox, Vice President and Chief Security Architect at SecureAuth, will discuss the importance of risk analysis and adaptive authentication in identity security and the future of access control in the era of digital transformation.


Speakers

Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and...


Lead Sponsor

SecureAuth is an identity security company that enables the most secure and flexible authentication experience for employees, partners and customers. Delivered as a service and deployed across cloud, hybrid and on-premises environments, SecureAuth manages and protects access to applications, systems and data at scale, anywhere in the world. The company provides the tools to build identity security into new and existing applications and workflows without impacting user experience or engagement, resulting in increased productivity and reduced risk.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Finding Your Path to Zero Trust

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00