Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date From VPN to VPN-less: Modernizing Secure Remote Access Seema Kathuria In this webinar, you will learn: Why using a VPN-less approach enhances security while minimizing user friction How the Duo Network Gateway helps org... 4 weeks ago | 60 mins Secure Your Cloud Environment from Evolving Threats Stanislav Sivak, Associate Managing Consultant, Synopsys | Arvinder Saini, Associate Principal Consultant, Synopsys As the migration to the cloud continues at an unabated pace, the threats in the cloud are also increasing proportionally and evolving constantly. Data... 3 weeks ago | 60 mins Secure Your Public Sector House with a Duo Deadbolt Bart Green and Bob Slaney In this webinar, you will learn: Why a work-from-anywhere security strategy needs to include better user and device visibility, not just MFA How zero... 1 month ago | 55 mins Cybersecurity Insurance and MFA: What You Need to Know Cole Haney, Darcie Gainer, Jim Salmonson In this webinar, you will learn: What cyber liability insurance is, and why it’s increasingly a necessity for organizations of every size Why multi-f... 3 weeks ago | 58 mins Secure your enterprise with multi-factor authentication for your Salesforce Sai Ranjan, Regional Manager, Thales & Nilesh Ghorpade, IAM Principal Consultant, Persistent Cyberattacks are on the rise and passwords no longer provide sufficient safeguard against unauthorised access to the Salesforce data. The cybersecurit... 2 months ago | 44 mins Trends in Cloud Security: Key Findings from the 2022 Thales Cloud Security Study Eric Hanselman, Principal Research Analyst, 451 Research; John McNeice, Research Analyst, 451 Research Businesses across the globe are accelerating the shift to the cloud in a modern digital world where hybrid workforces are accessing data from anywhere... June 23, 2022 2:00pm Identity Assurance: Addressing the Achilles Heel of Multi-Factor Authentication Joe O'Donnell, Chief Growth Officer, Validsoft; Dan Miler, Lead Analyst, Opus Research; Derek Top, Opus Research Increase in the number and size of data breaches and consumer fraud incidences reflect deficiencies in today’s approaches to identification and access... 3 hours ago | 37 mins Captivate Your Target Audience with an All-Around Customer Identity Experience Christine Garvey, Sandeep Kumbhat, Andy March, Payal Pan Great customer experiences are no longer just nice to have, they’re a key differentiator between you and your competitors. Consumers seek brands that ... May 19, 2022 9:00am How can a shared security approach help ensure that your security is watertight? Danna Bethlehem, Director IAM Product Management - Access Management and Authentication You’d be forgiven for thinking that, as the major cloud providers have massive security teams, you can strike ‘security’ off your list of things to wo... May 19, 2022 10:00am How to Implement Critical Access Management Rob Palermo, VP of Product Management & Strategy at SecureLink Every organization understands the importance of securing its most critical assets. These are the systems, applications, and data that are critical to... 1 day ago | 35 mins Load more