InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

5 Ways Duo Helps you Combat Identity Attacks

Presented by

Mike Rotar, Cisco Duo Product Marketing Manager

About this talk

Recent breaches, including a prominent data warehousing company, have sent shockwaves through the tech community, and this is a stark reminder that no organization, no matter the size, is immune to cyberattacks. In this webinar, identity security expert, Mike Rotar, will highlight five ways to combat identity attacks – starting with the current attack landscape, explore the lessons learned from recent attacks, and how Duo can be your ally in safeguarding your identities from ‘low-hanging fruit’ identity attacks in the wild. Hopefully, by the end of the session, attendees will feel equipped to dramatically improve their identity defenses – because at Duo, we’ve got you!
Duo Security - Cisco

Duo Security - Cisco

22274 subscribers107 talks
Democratizing security through zero-trust secure access.
Duo is a cloud-based security platform that protects access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control. Duo verifies users' identities with strong multi-factor authentication. Paired with deep insights into your users’ devices, Duo gives you the policies and control you need to limit access based on endpoint or user risk. Users get a consistent login experience with Duo's single sign-on that delivers centralized access to both on-premises and cloud applications. With Duo, you can protect against compromised credentials and risky devices, as well as unwanted access to your applications and data. This combination of user and device trust builds a strong foundation for a zero-trust security model.
Related topics