Mitigate Identity-Related Breaches in the Era of Digital Transformation

  • LANGUAGE: English DATE: Thursday, March 21, 2019 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
Upcoming Webinars
Mitigate Identity-Related Breaches in the Era of Digital Transformation

Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.

This Webinar covers the following topics:

  • An overview and methodology of KuppingerCole Leadership Compass for Adaptive Authentication.
  • How Adaptive Authentication can enable your business and protect against identity-related breaches.
  • How IT security professionals can make better access decisions, maximize security, and improve user experience.

In this KuppingerCole webinar, John Tolbert, Lead Analyst, will describe the concept of adaptive authentication. He will also discuss the KuppingerCole Leadership Compass for Adaptive Authentication and the criteria used for analyzing vendor products and services.

In the second part, Stephen Cox, Vice President and Chief Security Architect at SecureAuth, will discuss the importance of risk analysis and adaptive authentication in identity security and the future of access control in the era of digital transformation.


Speakers

Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and...


Lead Sponsor

SecureAuth is an identity security company that enables the most secure and flexible authentication experience for employees, partners and customers. Delivered as a service and deployed across cloud, hybrid and on-premises environments, SecureAuth manages and protects access to applications, systems and data at scale, anywhere in the world. The company provides the tools to build identity security into new and existing applications and workflows without impacting user experience or engagement, resulting in increased productivity and reduced risk.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00