RSA #2 - Transforming Secure Access to be Pervasive - 5 Ways to Transform Access

Logo
Presented by

Tony Karam, Identity Product Marketing, RSA

About this talk

Ever heard the expression, “you can’t hit what you can’t see?” Well that sentiment rings true when it comes to protecting access to critical resources. You can only secure what you actually take steps to protect. .As such, secure access needs to be pervasive and cover all access user cases, regardless of whether applications and resources live on-premises or in the cloud. And because it’s likely have both, you need a solution that works equally well across these hybrid environments. In this session we will explore five critical secure access use cases, and how you can achieve a high-level of identity assurance that users are who that claim to be so that you can avoid falling victim to the next wave of credential-based attacks.
Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (453)
Subscribers (143059)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.