Hi [[ session.user.profile.firstName ]]

Adaptive Strong Auth & Federated SSO - The New Power Couple

Enterprises are adopting federated SSO to cloud SaaS apps such as Google Apps and Salesforce to reduce helpdesk costs associated with password resets. But there’s another good reason to centralize authentication in the enterprise: it lets you you perform two-factor strong authentication to enable se
Enterprises are adopting federated SSO to cloud SaaS apps such as Google Apps and Salesforce to reduce helpdesk costs associated with password resets. But there’s another good reason to centralize authentication in the enterprise: it lets you you perform two-factor strong authentication to enable secure access to these cloud applications. Strong authentication via hardware tokens has been used to secure internal app access for some time, but recent events have shown this method to have serious downsides. As the cloud, partners, and a remote workforce drive demand for access to sensitive applications outside the traditional firewall, clearly a more convenient, adaptive, and portable strong authentication model is required. The emergence of federated internet SSO and mobile-based software tokens provide a more powerful, flexible approach.

Join Intel & McAfee, along with special guest Eve Maler of Forrester Research, in this webinar to explore the linkages between adaptive strong auth and federated SSO. You will learn:
•How to enable strong auth with federated SSO to SaaS applications like Google Apps and Salesforce
•How to make the strong auth adaptive based on contextual elements such as target application, who the user is, which group he belongs to, which client device are they accessing from, and such
•How SAML makes authentication context portable and enables federated SSO
•How to deliver one-time passwords over various channels such as smartphone apps, SMS, email, and Yubikeys
•How to keep management costs low for strong auth with self registration
Recorded Jul 27 2011 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eve Maler, Principal Analyst, Forrester and Vikas Jain, Director of Product Management for Intel Cloud Identity and Security
Presentation preview: Adaptive Strong Auth & Federated SSO - The New Power Couple
Recommended for you:
  • Date
  • Rating
  • Views
  • Bringing IT All Together — Modern Monitoring for Hybrid IT Bringing IT All Together — Modern Monitoring for Hybrid IT Jay Lyman, 451 Research; Kent Erickson, Zenoss Recorded: May 4 2016 46 mins
    The cloud is here to stay. However, that also means more and more companies are realizing that they’ve built two separate IT teams and are struggling to deliver quality services without a unified view. A true hybrid monitoring solution is the answer to this common problem.

    Join Jay Lyman, Analyst at 451 Research, and Kent Erickson, Alliance Strategist at Zenoss, as they discuss what is shaping hybrid IT, where it's going, and what to do about it.
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • New Rules for Recovery: Setting Expectations for Today's Continuity Platforms New Rules for Recovery: Setting Expectations for Today's Continuity Platforms Jim Whalen, Taneja Group; Dave LeClair, Unitrends Recorded: May 4 2016 47 mins
    Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.
  • New Rules for Recovery: Setting Expectations for Today's Continuity Platforms New Rules for Recovery: Setting Expectations for Today's Continuity Platforms Jim Whalen, Taneja Group; Dave LeClair, Unitrends Recorded: May 4 2016 47 mins
    Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.
  • New Rules for Recovery: Setting Expectations for Today's Continuity Platforms New Rules for Recovery: Setting Expectations for Today's Continuity Platforms Jim Whalen, Taneja Group; Dave LeClair, Unitrends Recorded: May 4 2016 47 mins
    Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.
  • Live Podcast - EMC World - Day 2 Recap Live Podcast - EMC World - Day 2 Recap Charlie Hodges, George Crump Recorded: May 4 2016 28 mins
    No registration required – EMC World 2016 is under way. Join me again as I sit down with George Crump, Lead Analyst at Storage Switzerland. In this live podcast we will give you a recap of EMC World day 2 and give you our analysis of the latest news from EMC.
  • Achieving Management and Operations Excellence Achieving Management and Operations Excellence Lee Kirby Recorded: May 3 2016 7 mins
    No matter how well designed and built your data center infrastructure may be, ultimately it is the day-to-day operations activities and management decisions where the success of your mission stands or falls. In fact, the leading cause of downtime is human error. To mitigate risks, achieve your business goals, and meet uptime requirements, it is critical to unify operating behaviors with the functionality of your infrastructure. These panelists will discuss how they have achieved M&O excellence across their global portfolios leveraging the Uptime Institute M&O Stamp of Approval.
  • DCIM Market Overview and Procurement Strategies DCIM Market Overview and Procurement Strategies Matt Stansberry Recorded: May 3 2016 44 mins
    The pursuit of Data Center Infrastructure Management (DCIM) benefits leads, too often, in a procurement and implementation process take too long, the software costs too much and the tools often under-deliver. Often, organizations fail to define business requirements for DCIM and evaluate options in a holistic and consistent framework. This webinar can help provide insight into why those outcomes occur and how to avoid.
  • Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Jon Oltsik, senior principal analyst, ESG & Maya Malevich, Director of Product Marketing, Tufin Recorded: May 3 2016 54 mins
    Between constraints of IT security skills and the rise of cloud adoption it is increasingly difficult to control security policies across the heterogeneous network. Network security and operations teams are expected to ensure and initiate connectivity while protecting the attack surface from the next cyber threat and complying with internal policies and industry regulations. Join us for a Webinar session with ESG senior principal analyst Jon Oltsik, as he reviews the latest findings of a recent survey on how cloud adoption is transforming network security operations. In this session we will also examine how security policy orchestration can help address some of the key challenges of managing security and connectivity in the cloud, and across hybrid cloud and physical networks.
  • Live Podcast - EMC World - Day 1 Recap Live Podcast - EMC World - Day 1 Recap Charlie Hodges, George Crump Recorded: May 3 2016 22 mins
    No registration required – EMC World 2016 is under way and StorageSwiss is there. Join me as I sit down with George Crump, Lead Analyst at Storage Switzerland. In this live podcast we will do more than just give you the news, we will give you our analysis of what the news means for EMC and for your organization.

    Join us live on May 3rd at 9am ET or on-demand afterward. No registration required.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Adaptive Strong Auth & Federated SSO - The New Power Couple
  • Live at: Jul 27 2011 5:00 pm
  • Presented by: Eve Maler, Principal Analyst, Forrester and Vikas Jain, Director of Product Management for Intel Cloud Identity and Security
  • From:
Your email has been sent.
or close
You must be logged in to email this