Extending Beyond the Limits of Multi-Factor Authentication With Continuous Adaptive Trust
- LANGUAGE: English DATE: Tuesday, December 03, 2019 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
The Identity and Access Management (IAM) market is undergoing rapid and at times transformative change. A steady progression from on-premises to API and cloud platforms is visible as vendors innovate, but authentication tools are under attack from determined adversaries.
Continuous development in the IAM space promises greater efficiency and better security, but criminal interest in identity evolves just as quickly. This is opening new cracks in some of our most trusted authentication processes such as MFA, requiring new solutions and security approaches.
As it becomes necessary for your company to refine its IAM processes for business and compliance reasons, it is imperative to remain aware of the criminal workarounds that unfortunately are a permanent aspect of implementing security measures.
In this KuppingerCole webinar you will learn about:
The changing IAM environment and security needs
Advantages of adopting recent IAM and MFA developments
The criminal techniques and motivations that threaten secure authentication
How even the best tools can still be beaten by determined criminal hackers
Planning for best practice IAM in your own organization
In the first part of this webinar, KuppingerCole Senior Analyst Paul Fisher will give an overview of the IAM space and how it is adapting to the changing threat landscape and business needs.
In the second part of this webinar, Mark Byers of Transmit Security will explain how using continuous adaptive risk and trust technologies can detect and stop cyber criminals should they successfully breach your authentication defenses.
2nd Alon Build, 94 Yigal Alon St. (8th floor, Suite #21) • 6789139 Tel Aviv • Israel
Transmit Security provides a best-in-class identity orchestration platform designed to simplify, accelerate, and reduce the cost of identity-related projects across channels. That reduction is accomplished by abstracting the identity-related business logic (which is complex and always changing) away from channel applications (web, mobile, call-center, kiosks, other) and to the platform's unique over-the-air orchestration and decisioning layer.
While businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT security teams are often too busy and understaffed to be able to give PAM the attention it deserves.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password management and automatic rotation, enforcement of the least privilege principle, vulnerability identification, risk management, central analysis, session management and monitoring, and efficient, comprehensive auditing. In four chapters, you will receive a multi-channel training including interactive online sessions, up-to-date research documents and an all-day workshop with final exam at the European Identity & Cloud Conference 2020 in Munich, Germany. Step-by-step KuppingerCole Analysts will turn you into a PAM Master that meets and exceeds privileged access management challenges of the 2020s!