Extending Beyond the Limits of Multi-Factor Authentication With Continuous Adaptive Trust

  • LANGUAGE: English DATE: Tuesday, December 03, 2019 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
Extending Beyond the Limits of Multi-Factor Authentication With Continuous Adaptive Trust

The Identity and Access Management (IAM) market is undergoing rapid and at times transformative change. A steady progression from on-premises to API and cloud platforms is visible as vendors innovate, but authentication tools are under attack from determined adversaries.

Continuous development in the IAM space promises greater efficiency and better security, but criminal interest in identity evolves just as quickly. This is opening new cracks in some of our most trusted authentication processes such as MFA, requiring new solutions and security approaches. 

As it becomes necessary for your company to refine its IAM processes for business and compliance reasons, it is imperative to remain aware of the criminal workarounds that unfortunately are a permanent aspect of implementing security measures. 

In this KuppingerCole webinar you will learn about: 

  • The changing IAM environment and security needs 

  • Advantages of adopting recent IAM and MFA developments 

  • The criminal techniques and motivations that threaten secure authentication 

  • How even the best tools can still be beaten by determined criminal hackers 

  • Planning for best practice IAM in your own organization 

In the first part of this webinar, KuppingerCole Senior Analyst Paul Fisher will give an overview of the IAM space and how it is adapting to the changing threat landscape and business needs. 

In the second part of this webinar, Mark Byers of Transmit Security will explain how using continuous adaptive risk and trust technologies can detect and stop cyber criminals should they successfully breach your authentication defenses. 


Speakers

Mark leads product marketing for Transmit Security's workforce identity and access solution portfolio for employees, contractors, vendors, distributors, and other third-parties that are granted access to an organization's IT resources. Previously he worked at Fortinet where he managed product...

Paul Fisher is a Senior Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry sectors including automotive. Paul is responsible for managing relevant quantitative research at...


Lead Sponsor

Transmit Security provides a best-in-class identity orchestration platform designed to simplify, accelerate, and reduce the cost of identity-related projects across channels. That reduction is accomplished by abstracting the identity-related business logic (which is complex and always changing) away from channel applications (web, mobile, call-center, kiosks, other) and to the platform's unique over-the-air orchestration and decisioning layer.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00