InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

A New Way with CBA: Bringing Phishing-resistant Authentication to Mobile

Presented by

Scott Truger, Partner Integrations Manager @ Axiad and Shakeel Aziz, Solutions Engineer @ Yubico

About this talk

Certificate-based authentication (CBA) has been a staple of governments and high security environments for decades, and remains a favorite amongst security experts due to its reliability and effectiveness in physical environments. However, when it comes to CBA on mobile, users have had little patience with its vendor requirements and cumbersome phone adapters. Now with Axiad and Yubico, there’s a new way to bring more security—and less friction—to mobile devices. Join Axiad and Yubico on March 30th to learn how your organization can achieve phishing-resistant authentication with CBA on mobile. We’ll discuss: • Phishing-resistant MFA trends and requirements • FIDO and CBA, the only two technologies that deliver phishing-resistant authentication • Why tech giants like Microsoft are investing in CBA with Microsoft Azure AD CBA • How to deploy a YubiKey for authentication with a certificate provisioned and managed by Axiad Cloud
Axiad

Axiad

2216 subscribers31 talks
Trusted Identity. At the speed of now.
Identity teams are drowning in complexity with fragmented tools, siloed data, blind spots, and manual processes. This chaos exposes organizations to breaches, ransomware, data theft, compliance failures, and budget overruns. Axiad tames the human and NHI chaos by automating visibility, intelligence, risk remediation, and lifecycle management. The result is a drastic acceleration of operational efficiency. —Eliminate thousands of work hours from manual processes, —Prioritize resources to make the most impact, —Reduce the risk of breach and the financial implications that come with it
Related topics