Hi [[ session.user.profile.firstName ]]

Beyond Two-Factor: Secure Access Control for O365

Beyond Two-Factor: Secure Access Control for O365
Prevent the Misuse of Stolen Credentials
Recorded Feb 11 2019 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Romer, Chief Secuirty Architect (EMEA)
Presentation preview: Beyond Two-Factor: Secure Access Control for O365

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Hybrid Identity and What it Means to You Recorded: Jul 18 2019 42 mins
    Rich Gibsen, CTO at SecureAuth and Robert Humphrey, CMO at SecureAuth
    Digital experiences (portals, commerce sites, communities, etc.) are strategic resources for most organizations. Providing secure access to these experiences is a challenge for both security and business teams alike. While nearly all organizations are developing these digital experiences in the cloud, the typical IT infrastructure includes systems that are cloud based, on-prem or hybrid. Your identity access management systems should mirror your organization’s infrastructure and enable you to deploy on-prem, in the cloud or hybrid.

    Hybrid Identity enables you to choose the deployment approach that fits your business, rather than fitting the approach of the vendor. Don’t compromise on experience and security, and don’t compromise on choice. Hybrid Identity gives you choice.

    Join us to learn what Hybrid Identity is, and how it can help better secure all your workforce and consumer identities. You’ll see Hybrid Identity in action, and how it results in minimal impact to users with maximum visibility to administrators. You’ll also hear about SecureAuth’s latest offerings and get a sneak peek into the future of identity.

    The Hybrid Identity journey is about to begin – sign up to find out how it can help better secure all your workforce and consumer identities.
  • New SecureAuth Solution: Deployment Freedom, Simple Admin, and Enhanced Security Recorded: Jun 27 2019 31 mins
    Damon Tepe, Director of Product Marketing at SecureAuth
    The SecureAuth® Identity Platform, formerly SecureAuth IdP, offers major enhancements.

    • Deployment Freedom - Hybrid, on-prem, or cloud — we offer the same capabilities regardless how you deploy.

    • Simple Administration - Save time by centrally building, reusing, and modifying security policies and settings, risk tolerances, system configurations, and user experiences.

    • Enhanced Security - Gain greater security and less user disruptions with biometric multi- factor authentication (MFA) and a unique dynamic perimeter policy check.

    • SecureAuth® Intelligent Identity Cloud — a cloud-based analytics engine that delivers continually updated identity intelligence.

    • Identity Security Intelligence dashboard — Out-of-the-box reporting of key metrics about your identity security status at the push of a button.

    Join us on June 27, 2019 at 1pm EDT/10am PDT to learn more about these enhancements.
  • ISSA Thought Leadership Series: Passwordless Authentication Recorded: Jun 12 2019 58 mins
    ISSA International
    Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.

    It is time to remove human error from the equation.

    The adoption of passwordless authentication protects against phishing attempts and minimizes the threat of stolen credentials. Passwordless technology generally combines: Multi-layered risk analysis that evaluates location, devices, access rights and typing sequences; Intricate yet convenient 2FA/MFA methods;
    Biometrics and hardware authentication keys

    Learn how passwordless authentication works and how it can help you increase security while reducing friction for your users.

    Stephen Cox, Vice President and Chief Security Architect, SecureAuth
    Mike McKinzie, Solutions Advisor, Swivel Secure
  • Office 365 Is Under Attack – Best Practices for Secure Access Recorded: Apr 23 2019 63 mins
    Damon Tepe, Director, Product Marketing, SecureAuth & Sean Dyon, Senior Sales Engineering, SecureAuth
    Office 365 (O365) is the most popular cloud service in the world - and one of the most attacked! 71% of organizations experience at least one compromised Office 365 account each month. Protecting this mission critical application and the sensitive data it stores must be a top priority.

    Organizations using Office 365 need more than traditional approaches - even Microsoft’s native security - to protect their organization.

    Learn best practices to:
    •Secure access beyond traditional approaches
    •Securely remove authentication disruptions for users based on risk
    •Reduce labor expenses and readily gain user adoption
  • Increase Access Protection Without Raising User Disruptions Recorded: Mar 13 2019 35 mins
    Damon Tepe, Director, Product Marketing, SecureAuth & Jeff Hickman, Director, Sales Engineering, SecureAuth
    Data breaches have risen 480% within Financial Services firms. With the Financial Services industry being plagued by constant risks and regular threats, professionals need to be at the top of their game to thwart criminals.

    Better breach protection begins with knowing more about the customers, partners, and/or employees requesting access to your systems. By analyzing multiple characteristics around devices, location, IP address, and behavior, organizations can elevate identity trust, remove authentication disruptions, make better access decisions, and even stop attackers with stolen credentials and ways around 2FA.

    Attend this webinar to learn:

    - Why passwords and 2FA give a false sense of security
    - How multiple risk checks, including behavior analysis via machine learning, unmask would be attackers (even insider threats)
    - When trust is high, you can securely remove user authentication steps
  • Two-Factor Authentication - You are not as protected as you think Recorded: Feb 21 2019 60 mins
    Damon Tepe & Jeff Hickman
    Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.

    Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.

    Better breach protection starts with better identity trust!

    During this session you’ll learn how:
    • Attackers are getting around two-factor authentication
    • Risk and context checks can raise trust in identities and identify attackers
    • Adaptive authentication delivers better access security without slowing down your business

    Damon Tepe - Director, Product Marketing, SecureAuth
    Jeff Hickman - Director of Sales Engineering, SecureAuth
  • Understanding & Safeguarding Credentials Recorded: Feb 12 2019 31 mins
    Andy Brown, James Romer & David Thomas
    Cyber-attacks happen every day and law firms are a prime target because their intellectual property & client data can be easily monetized. Passwords, and even 2FA, alone are not enough. Ensure your data access is secured with multi-factor and adaptive authentication from the market leader, SecureAuth IdP.
  • Portal Protection Using Adaptive Authentication: Enable Users & Enhance Security Recorded: Feb 12 2019 6 mins
    Damon Tepe & Jeff Hickman
    An age-old dilemma: security versus user experience. Traditionally, hardening security adds to the user burden. But with 81% of reported breaches involving stolen or weak credentials, can you continue to sacrifice security for user convenience? Good news, you don’t have to. Raise security without raising disruptions, SecureAuth IdP.
  • Delivering Trusted Digital Customer Experiences with Adaptive Access Control Recorded: Feb 12 2019 42 mins
    Robert Block, SVP of Identity Security (SecureAuth) & Merritt Maxium, Principal Analyst (Forrester)
    Delivering Trusted Digital Customer Experiences with Adaptive Access Control
  • Beyond Two-Factor: Secure Access Control for O365 Recorded: Feb 11 2019 36 mins
    James Romer, Chief Secuirty Architect (EMEA)
    Beyond Two-Factor: Secure Access Control for O365
    Prevent the Misuse of Stolen Credentials
  • The Death of 2FA and the Birth of Modern Authentication Recorded: Feb 11 2019 61 mins
    Frank Dickson, Research Director (IDC) & Keith Graham, CTO (SecureAuth)
    The Death of 2FA and the Birth of Modern Authentication
SecureAuth, the secure identity company, provides the most advanced identity security solution for large organizations globally to enable secure access to systems, applications, and data. Our customers leverage our flexible, enterprise-grade identity and access platform coupled with the SecureAuth Intelligent Identity Cloud service to deliver the most secure, frictionless user experience for their customers, partners and employees, everywhere, exponentially reducing the threat surface, enabling user adoption and meeting business demands. To learn more, visit www.secureauth.com, or connect with us at info@secureauth.com, Twitter, and LinkedIn.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Beyond Two-Factor: Secure Access Control for O365
  • Live at: Feb 11 2019 7:05 pm
  • Presented by: James Romer, Chief Secuirty Architect (EMEA)
  • From:
Your email has been sent.
or close