InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

3 Concrete Ways to Improve Your Identity Security

Presented by

Ted Kietzman, Cisco Duo Product Marketing Manager

About this talk

Most people know that identity-based attacks are on the rise. The cybersecurity headlines seem full of breaches that involve identity as a key target. But, just because a problem is prevalent, doesn’t mean solutions to the problem are easy to implement. In fact, it can often feel overwhelming to break down the problem of identity-based attacks into concrete actions that will help improve defenses. In this webinar, cybersecurity expert, Ted Kietzman, will highlight three key strategies to improving identity security – starting at the conceptual level and then diving deeper into descriptive examples of how each will help strengthen the identity perimeter. Hopefully, by the end of the session, attendees will feel equipped to dramatically improve their identity defenses – because at Duo, we’ve got you!
Duo Security - Cisco

Duo Security - Cisco

22279 subscribers107 talks
Democratizing security through zero-trust secure access.
Duo is a cloud-based security platform that protects access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control. Duo verifies users' identities with strong multi-factor authentication. Paired with deep insights into your users’ devices, Duo gives you the policies and control you need to limit access based on endpoint or user risk. Users get a consistent login experience with Duo's single sign-on that delivers centralized access to both on-premises and cloud applications. With Duo, you can protect against compromised credentials and risky devices, as well as unwanted access to your applications and data. This combination of user and device trust builds a strong foundation for a zero-trust security model.
Related topics