Hi [[ session.user.profile.firstName ]]

SecureAuth

  • Date
  • Rating
  • Views
  • Office 365 Is Under Attack – Best Practices for Secure Access
    Office 365 Is Under Attack – Best Practices for Secure Access
    Damon Tepe, Director, Product Marketing, SecureAuth & Sean Dyon, Senior Sales Engineering, SecureAuth Recorded: Apr 23 2019 63 mins
    Office 365 (O365) is the most popular cloud service in the world - and one of the most attacked! 71% of organizations experience at least one compromised Office 365 account each month. Protecting this mission critical application and the sensitive data it stores must be a top priority.

    Organizations using Office 365 need more than traditional approaches - even Microsoft’s native security - to protect their organization.

    Learn best practices to:
    •Secure access beyond traditional approaches
    •Securely remove authentication disruptions for users based on risk
    •Reduce labor expenses and readily gain user adoption
  • Increase Access Protection Without Raising User Disruptions
    Increase Access Protection Without Raising User Disruptions
    Damon Tepe, Director, Product Marketing, SecureAuth & Jeff Hickman, Director, Sales Engineering, SecureAuth Recorded: Mar 13 2019 35 mins
    Data breaches have risen 480% within Financial Services firms. With the Financial Services industry being plagued by constant risks and regular threats, professionals need to be at the top of their game to thwart criminals.

    Better breach protection begins with knowing more about the customers, partners, and/or employees requesting access to your systems. By analyzing multiple characteristics around devices, location, IP address, and behavior, organizations can elevate identity trust, remove authentication disruptions, make better access decisions, and even stop attackers with stolen credentials and ways around 2FA.

    Attend this webinar to learn:

    - Why passwords and 2FA give a false sense of security
    - How multiple risk checks, including behavior analysis via machine learning, unmask would be attackers (even insider threats)
    - When trust is high, you can securely remove user authentication steps
  • Two-Factor Authentication - You are not as protected as you think
    Two-Factor Authentication - You are not as protected as you think
    Damon Tepe & Jeff Hickman Recorded: Feb 21 2019 60 mins
    Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.

    Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.

    Better breach protection starts with better identity trust!

    During this session you’ll learn how:
    • Attackers are getting around two-factor authentication
    • Risk and context checks can raise trust in identities and identify attackers
    • Adaptive authentication delivers better access security without slowing down your business


    Speakers:
    Damon Tepe - Director, Product Marketing, SecureAuth
    Jeff Hickman - Director of Sales Engineering, SecureAuth
  • Understanding & Safeguarding Credentials
    Understanding & Safeguarding Credentials
    Andy Brown, James Romer & David Thomas Recorded: Feb 12 2019 31 mins
    Cyber-attacks happen every day and law firms are a prime target because their intellectual property & client data can be easily monetized. Passwords, and even 2FA, alone are not enough. Ensure your data access is secured with multi-factor and adaptive authentication from the market leader, SecureAuth IdP.
  • Portal Protection Using Adaptive Authentication: Enable Users & Enhance Security
    Portal Protection Using Adaptive Authentication: Enable Users & Enhance Security
    Damon Tepe & Jeff Hickman Recorded: Feb 12 2019 6 mins
    An age-old dilemma: security versus user experience. Traditionally, hardening security adds to the user burden. But with 81% of reported breaches involving stolen or weak credentials, can you continue to sacrifice security for user convenience? Good news, you don’t have to. Raise security without raising disruptions, SecureAuth IdP.
  • SecureAuth Adaptive Access Control
    SecureAuth Adaptive Access Control
    SecureAuth Recorded: Feb 12 2019 3 mins
    SecureAuth Adaptive Access Control
  • Delivering Trusted Digital Customer Experiences with Adaptive Access Control
    Delivering Trusted Digital Customer Experiences with Adaptive Access Control
    Robert Block, SVP of Identity Security (SecureAuth) & Merritt Maxium, Principal Analyst (Forrester) Recorded: Feb 12 2019 42 mins
    Delivering Trusted Digital Customer Experiences with Adaptive Access Control
  • Beyond Two-Factor: Secure Access Control for O365
    Beyond Two-Factor: Secure Access Control for O365
    James Romer, Chief Secuirty Architect (EMEA) Recorded: Feb 11 2019 36 mins
    Beyond Two-Factor: Secure Access Control for O365
    Prevent the Misuse of Stolen Credentials
  • The Death of 2FA and the Birth of Modern Authentication
    The Death of 2FA and the Birth of Modern Authentication
    Frank Dickson, Research Director (IDC) & Keith Graham, CTO (SecureAuth) Recorded: Feb 11 2019 61 mins
    The Death of 2FA and the Birth of Modern Authentication

Embed in website or blog