Sure, you can spell enterprise security without the letters M-F-A, but the modern digital enterprise isn't as cyber secure without a strong multi-factor authentication (MFA) strategy.
Enterprises are under attack, and credentials are a primary target. According to the 2015 Verizon DBIR, 95% of all web app hacks involve credentials that were harvested from customer devices. Many leading enterprises are enhancing their security and control with MFA, allowing them to move away from a high-risk, password based security approach and to give their employees, partners, and customers a better user experience.
Join Paul Madsen from the CTO office of Ping Identity as he covers:
- Authentication 101
- Choosing the right authentication mechanisms for your environment
- Applying a risk based model to step-up MFA
- Best practices in step-up MFA including: risk analysis, self-service, native applications, multiple touch points/channels, and more
Paul Madsen, Principal Technical Architect, Ping Identity
Delivering a Single SignOn (SSO) experience to users of native applications is becoming more and more critical as the number of such applications grows. We'll cover the best practice for native applications authenticating to restful APIs, the different models for enabling SSO across such applications, and how recent enhancements to the mobile OSs promise to offer to a nice balance between usability, security, and deployment ease.
Hans Zandbelt, Senior Technical Architect, Ping Identity
Join this thought provoking webinar for a discussion of the security and scalability challenges that cloud & mobile era brings along. Specifically, we will cover:
- A description of how token-based systems and multi-factor authentication can replace password based systems and the associated benefits of that
- A description of next generation identity protocols OAuth 2.0 and OpenID Connect and how they fit the bill
- An overview of a scalable and next-generation identity infrastructure that will secure the cloud and mobile
Con la crescente adozione di applicazioni cloud (Software As a Service) le aziende si trovano a fronteggiare il problema di garantire l'accesso dei propri dipendenti a tali applicazioni. Durante il Webinar verrà discusso come gli attuali standard di federazione indirizzano tale tematica e come le soluzioni di Ping Identity aiutino le aziende a garantire che gli accessi alle applicazioni cloud avvengano in modo sicuro e allo stesso con una buona "user experience"
Hans Zandbelt, CTO - Senior Architect, Ping Identity
Travel through the Identiverse and discover the importance of identity security in a connected world.
Benefits of attending:
• Gain an understanding of the issues of identity security in the Cloud
• Get a clear picture of the standards that will enable deliver identity security in the real world
• Be informed about the latest trends affecting managing identities of people and things in the Cloud
Join David Gorton as he goes over securing access to multiple applications, as well as the architect identity frameworks for all your applications.
David Gorton is a Product Manager with Ping Identity. He has more than 15 years of designing, developing, testing, and maintaining highly performant enterprise software systems. He spent six years building and maintaining BEA Weblogic Workshop for webservice and J2EE development. Now David focuses his time on creating next generation identity and access management products that will solve hard enterprise problems.
Hans Zandbelt, Technical Architect, Office of the CTO, Ping Identity
Employees are bringing their own tablets, smartphones, personal computing devices – and their expectations of how they want to perform their jobs, to work. But, whether the employee or enterprise bought the phone, with shared-use devices the fundamental requirements are the same – keep business data secure, and personal data private.
This webinar will present an application architecture for mobile that’s built around the identity of the employee. The architecture will consider the employee’s role and authorization rights to access business apps and data, while also ensuring personal data is not accessible by the enterprise. Questions covered include:
Why is BYOD an identity problem?
What BYOD factors must be balanced?
What identity standards can help address BYOD?
Andrew Hindle, Director – WW Technical Marketing, Ping Identity
Why identity and security is key to the Cloud and how we can make it work. In this session Andrew will explore how Cloud single sign-on, implemented the right way using well-established standards, is helping to solve both the security and the convenience problem; and will look at how these standards are evolving to include broader trends of mobile and API access.
About the speaker:
Andrew's expertise in digital business and identity is built on 6 years of worldwide experience at Ping Identity across a broad range of private and public sector identity projects. Before joining Ping, Andrew held a variety of technical architecture and product management positions with leading software companies including Allaire, Macromedia and Adobe. He is currently Director of World Wide Technical Marketing at Ping Identity.
Explore Cloud Identity Security with Ping Identity.
Experience Single Sign-on for Cloud and Mobile
Find out how our identity and access management platform gives enterprise customers and employees one-click access to any application from any device.