InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Shape user behavior to drive MFA best practices with Axiad Airlock and YubiKeys

Presented by

Jerome Becquart, COO, Axiad Percy Wadia, VP of Product Management, Yubico

About this talk

With many organizations supporting a hybrid/remote workforce, deploying authentication solutions to dispersed users can be challenging. Users often lose their credentials, let them expire, or don’t follow security policies – all of which are exacerbated when organizations implement more credentials to meet varying business needs. Organizations are looking for better and more efficient ways to improve security, while encouraging users to adopt best practices and enhance productivity. Airlock, an Axiad Cloud feature, enables users to comply with company-assigned directives, such as issuing a new credential, updating a certificate, or taking the latest security training by shaping user behaviors. YubiEnterprise Services helps organizations procure and distribute Yubico’s phishing-resistant hardware security keys to remote and in-office workers. Attend the webinar to learn: -How Axiad and Yubico empower organizations to adapt to the security demands of a hybrid/remote workforce -Expert insights on driving teams to adopt security best practices and overcome the logistical challenges that come with it -What Axiad and Yubico can do to help bridge legacy multi-factor authentication (MFA) to passwordless authentication Confidentiality and Data Processing: The information you provide in this form will be held in accordance with applicable privacy laws by Yubico, Inc. and Axiad, Inc. for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. Your personal data is retained by Yubico and Axiad only as needed in accordance with their respective data retention practices. Please refer to Yubico’s and Axiad’s respective websites for more information about their privacy policies.
Axiad

Axiad

2214 subscribers31 talks
Trusted Identity. At the speed of now.
Identity teams are drowning in complexity with fragmented tools, siloed data, blind spots, and manual processes. This chaos exposes organizations to breaches, ransomware, data theft, compliance failures, and budget overruns. Axiad tames the human and NHI chaos by automating visibility, intelligence, risk remediation, and lifecycle management. The result is a drastic acceleration of operational efficiency. —Eliminate thousands of work hours from manual processes, —Prioritize resources to make the most impact, —Reduce the risk of breach and the financial implications that come with it
Related topics