The Passwordless Enterprise: Building A Long-Term Zero Trust Strategy
- LANGUAGE: English DATE: Thursday, July 11, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
“The password is dead.” We have heard this statement for at least a decade, yet even in 2019, data breaches based on stolen user credentials continue to dominate the headlines. Why do passwords so stubbornly refuse to die?
In modern IT environments that span on-premises and cloud applications and services, adoption of the more sophisticated multi-factor authentication often leads to the need to use multiple security devices, driving costs and user frustration even further up.
But it does not have to be this way! New emerging technologies can replace both passwords and security tokens to improve user experience and the level of security across the organization.
Join this KuppingerCole webinar to learn about:
- Recent and future trends in the authentication market
- How to eliminate passwords in your enterprise
- Best practices for building a long-term zero trust strategy
In this session, KuppingerCole Lead Analyst Alexei Balaganski will talk about the recent developments in the field of strong authentication.
George Tubin from Transmit Security will discuss how enterprises can and should adopt a zero trust strategy.
2nd Alon Build, 94 Yigal Alon St. (8th floor, Suite #21) • 6789139 Tel Aviv • Israel
Transmit Security provides a best-in-class identity orchestration platform designed to simplify, accelerate, and reduce the cost of identity-related projects across channels. That reduction is accomplished by abstracting the identity-related business logic (which is complex and always changing) away from channel applications (web, mobile, call-center, kiosks, other) and to the platform's unique over-the-air orchestration and decisioning layer.
Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.