Implementing the Identity and Device Security Principles of Zero Trust

Logo
Presented by

Baber Amin, CTO West, Ping Identity; Bill Harrod, Federal CTO, Mobilelron; Farhan Saifudin, Sr. Solutions Engineer

About this talk

Highly sensitive customer data and intellectual property is no longer safe behind the corporate perimeter. Employees and partners need access remotely. They’re using personal devices for work. And the data itself is hosted in the cloud, accessible through SaaS apps and public APIs. To protect their businesses and customers, enterprise security teams must adapt to the new realities of digital business. Join Ping Identity and MobileIron as they discuss an identity and mobile centric approach to enabling Zero Trust security. You will learn: - Capabilities needed to verify users, applications, devices and transactions - Leveraging user and device risk signals to enforce adaptive access control - Mitigating breaches by detecting and remediating common mobile vulnerabilities - Preventing the use of stolen credentials with passwordless and Zero Sign on

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (65)
Subscribers (3922)
Explore Cloud Identity Security with Ping Identity. Experience Single Sign-on for Cloud and Mobile Find out how our identity and access management platform gives enterprise customers and employees one-click access to any application from any device.