Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date eKYC Strategies to Boost Customer Onboarding & Reduce Abandonment Ben Musso, Managing Director at REYL Group - Stuart Wells, CTO at Jumio - Gustavo Racioppi, CEO at Altipeak When opening an account, customers want a fast, secure and seamless onboarding process. With highly secured self- onboarding, prospects can access the... September 6, 2022 9:00am The Endpoint Security Alphabet Stew Must Include VM and PM Charles Kolodgy, Adjunct Professor, Rivier University | Principal, Security Mindsets Endpoint Security can either be the first or the last line of defense. From the beginning, it has primarily been accomplished by adding some type of s... 3 weeks ago | 37 mins iboss and Microsoft: Powering Zero Trust with Secure Resource Access Paul Martini According to the Cybersecurity and Infrastructure Security Agency (CISA) the root cause of ransomware attacks in 2021 was due to unauthorized access t... 21 hours ago | 60 mins The Whole Onboarding Experience, Enhance UX, Security, & Productivity from Day 1 Lisa Matragrano, Sr. Marketing Product Manager, Adarsh Kesari, Solution Engineer, and Taylor Boring, Solution Engineer Want to know how you can achieve seamless, secure onboarding that balances employee experience, management, and security? Join our expert panel as the... 13 hours ago | 44 mins From SAML to OIDC: Single Sign-On for Modern Applications Aman Nagra, Product Manager Lead, Duo and Colin Medfisch, Product Manager, SSO, Duo In today’s cloud and mobile first era, modern enterprises not only have to provide secure and scoped access to users but also to machine identities. I... 2 days ago | 47 mins Demo Series: How To Easily Secure Remote Access With Perimeter 81 Joshua Freiberg Today, your business or organization must rapidly adapt to the evolution of network security and the future of work. Employees and teams are working f... 1 week ago | 29 mins Critical MAS: Mobile Application Security for the Current Threat Landscape Richard Melick, Director of Threat Insights and Product Strategy, Zimperium The mobile threat landscape is signaling that a complete change in mindset is required in order to build, ship, and maintain secure mobile application... August 25, 2022 3:00pm How PingOne DaVinci Can Accelerate Your Passwordless Journey Sam Brown, Solutions Marketing Manager, Ping Identity & Moshe Ben-Noun, Product Manager, Ping Identity In today’s world, digital experience is everything. It can mean the difference between winning a customer or simply getting work done. But for years, ... 1 day ago | 47 mins The New “mHealth” Golden Age: What Are the Mobile Security Implications? Chris Akeroyd, Children's Health | Vince Nguyen, Medtronic | Monique Becenti, Zimperium | Krishna Vishnubhotla, Zimperium Due largely to the global COVID-19 pandemic, we are now living in the golden era of mobile health, or “mHealth,” as it has come to be called. The Worl... 3 weeks ago | 58 mins Cutting through the Buzzwords: What is Security Service Edge (SSE)? Michael Simpson, Lookout According to Gartner, by 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services, and private application access from a sin... August 23, 2022 10:00am Load more