Eliminate Passwords With Invisible Multi-Factor Authentication

Webinar
Eliminate Passwords With Invisible Multi-Factor Authentication

The webinar took place on Thursday, March 10, 2022
Webinar Presentation Martin Kuppinger
Webinar Presentation Patrick McBride

Watch the Recording

Join this webinar to:

  • Understand why passwords are inherently weak and should be discarded.
  • Learn the benefits of using passwordless authentication.
  • Discover a strong and effective way of providing secure MFA for employees.
  • Find out why current MFA solutions using second devices are risky.
  • Learn the benefits of combining identity-bound devices with real-time device health checks.
  • Get an overview of Beyond Identity’s Secure Work product.

How to Improve Security With Frictionless MFA

A high proportion of data breaches and ransomware attacks exploit stolen credentials. Eliminating passwords with multifactor authentication is an effective way to reduce the risk of unauthorized access to company networks, systems, SaaS applications, cloud infrastructure, and data. But not all MFA systems are created equal.

Finding a strong passwordless MFA solution that is user friendly and supports a Zero Trust approach to security, is essential, according to Martin Kuppinger at KuppingerCole and Patrick McBride at Beyond Identity. Join these experts for an interactive discussion about why some MFA solutions are weak, while others typically remain un-deployed because of end-user push back.

Speakers Contribution

Martin Kuppinger will kick off with a short overview of passwordless authentication and explain how it achieves both increased convenience and security, as an introduction to the discussion about MFA, focusing on simple onboarding, support for multiple devices and use cases, and how to achieve real passwordless authentication.

The discussion will also look at how MFA solutions need to evolve to drive adoption and remain effective against phishing etc. Patrick McBride will end with a brief explanation of how MFA can be implemented by cryptographically binding user identities to devices so that endpoints can be secured by dynamically enforcing access policies based on device security posture data.

 Never Miss Another Webinar

Enter your email to subscribe:

Patrick has served as CMO of ZeroFOX and Claroty, as VP of Marketing at iSIGHT Partners and Xceedium, VP of Compliance at Scalable Software, Co-founder and CEO of META Security Group, and Senior Vice President at META Group. Patrick received a bachelor’s degree in management from...

Lead Sponsor

         FAQ

Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.

To register for the webinar, you need to log in to your KuppingerCole User first. If you do not have a KuppingerCole User yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated email address.

Our webinars last approximately 50-60 minutes.

If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.

We use the "GoToWebinar" software for the webinars. Simply click on "Join the webinar" in the registration confirmation. GoToWebinar will check directly on your computer if the software is already installed. If not, the installation process will start automatically, and you only need to confirm it.

To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. A combination of computer and telephone is also possible - you then follow the webinar via your Internet connection on the computer and dial in at the same time via telephone to listen to the moderator's explanations. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.

Our webinars are generally free of charge.

The recordings and presentation slides will be available on the website shortly after the webinar. An email will be sent to all registered users. In order to access the materials, you will need to log in to your KuppingerCole User first.

Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business. You do not need to deregister.

In some companies there are - mostly due to restrictive IT policies - problems with the installation. We regret this, of course, but cannot provide support in these cases. But no problem: You will receive the recording after the webinar, which you can watch in a normal web browser.