It’s long past time cloud-based applications transition away from shared secrets for authentication. The risks are just too high, especially when it comes to protecting sensitive privileged user credentials, and powerful management consoles and APIs. But the same infrastructure that allows for the distribution of SSL certificates is also widely available to issue strong digital signature credentials. And those powerful credentials would dramatically reduce the impact of vulnerabilities like Heartbleed, and coordinated attacks such as the Target breach. Stolen and mis-used credentials, like userids and passwords, were the Number One way to gain access to unauthorized access to information and systems, according to the 2014 Verizon Data Breach Report.
Join us for this live webcast, Thursday, May 22 at 11 am ET, when our expert panel will discuss:
•The risks stolen and misused credentials pose to organizations of all kinds.
•Growing compliance and audit requirements driving a more secure approach
•The solution, widely available today, that eliminates many of the vulnerabilities that plague traditional authentication approaches.
•An approach that enables logical PIV/CAC access across the enterprise – data center and the cloud.
Our Panelists include:
•Ken Ammon, Chief Strategy Officer, Xceedium
•Daniel Turissini, Executive Vice President and Chief Technology Officer, WidePoint Corporation
•Sander Temme, Senior Product Line Manager, Thales e-Security