Hi [[ session.user.profile.firstName ]]

SecureAuth

  • Date
  • Rating
  • Views
  • Two-Factor Authentication - You are not as protected as you think
    Two-Factor Authentication - You are not as protected as you think
    Damon Tepe & Jeff Hickman Recorded: Feb 21 2019 60 mins
    Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.

    Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.

    Better breach protection starts with better identity trust!

    During this session you’ll learn how:
    • Attackers are getting around two-factor authentication
    • Risk and context checks can raise trust in identities and identify attackers
    • Adaptive authentication delivers better access security without slowing down your business


    Speakers:
    Damon Tepe - Director, Product Marketing, SecureAuth
    Jeff Hickman - Director of Sales Engineering, SecureAuth
  • 2FA is Not Enough
    2FA is Not Enough
    Rob Pakai and J.R. Miller Recorded: Feb 12 2019 31 mins
    Using two-factor authentication (2FA) alone is not enough to protect against determined attackers. If security is important, you need to look beyond just 2FA. The next generation of identity security uses risk checks to supplement 2FA, improving security and significantly reducing authentication disruptions for users.
  • Understanding & Safeguarding Credentials
    Understanding & Safeguarding Credentials
    Andy Brown, James Romer & David Thomas Recorded: Feb 12 2019 31 mins
    Cyber-attacks happen every day and law firms are a prime target because their intellectual property & client data can be easily monetized. Passwords, and even 2FA, alone are not enough. Ensure your data access is secured with multi-factor and adaptive authentication from the market leader, SecureAuth IdP.
  • Portal Protection Using Adaptive Authentication: Enable Users & Enhance Security
    Portal Protection Using Adaptive Authentication: Enable Users & Enhance Security
    Damon Tepe & Jeff Hickman Recorded: Feb 12 2019 6 mins
    An age-old dilemma: security versus user experience. Traditionally, hardening security adds to the user burden. But with 81% of reported breaches involving stolen or weak credentials, can you continue to sacrifice security for user convenience? Good news, you don’t have to. Raise security without raising disruptions, SecureAuth IdP.
  • SecureAuth Adaptive Access Control
    SecureAuth Adaptive Access Control
    SecureAuth Recorded: Feb 12 2019 3 mins
    SecureAuth Adaptive Access Control
  • Delivering Trusted Digital Customer Experiences with Adaptive Access Control
    Delivering Trusted Digital Customer Experiences with Adaptive Access Control
    Robert Block, SVP of Identity Security (SecureAuth) & Merritt Maxium, Principal Analyst (Forrester) Recorded: Feb 12 2019 42 mins
    Delivering Trusted Digital Customer Experiences with Adaptive Access Control
  • Beyond Two-Factor: Secure Access Control for O365
    Beyond Two-Factor: Secure Access Control for O365
    James Romer, Chief Secuirty Architect (EMEA) Recorded: Feb 11 2019 36 mins
    Beyond Two-Factor: Secure Access Control for O365
    Prevent the Misuse of Stolen Credentials
  • The Death of 2FA and the Birth of Modern Authentication
    The Death of 2FA and the Birth of Modern Authentication
    Frank Dickson, Research Director (IDC) & Keith Graham, CTO (SecureAuth) Recorded: Feb 11 2019 61 mins
    The Death of 2FA and the Birth of Modern Authentication

Embed in website or blog