ºÝºÝߣshows by User: SecureAuth2FASSO / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: SecureAuth2FASSO / Wed, 11 Oct 2017 16:08:14 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: SecureAuth2FASSO Webinar: Goodbye RSA. Hello Modern Authentication. /SecureAuth2FASSO/webinar-goodbye-rsa-hello-modern-authentication webinarrsa-ukoct10-final-171011160815
If you are seeking an alternative to RSA’s rigid workflows, costly maintenance and obstructive user experience, there is a better way. SecureAuth has helped hundreds of RSA customers move to an access control solution that offers more flexibility, visibility and can reduce total cost of ownership by over 50%.]]>

If you are seeking an alternative to RSA’s rigid workflows, costly maintenance and obstructive user experience, there is a better way. SecureAuth has helped hundreds of RSA customers move to an access control solution that offers more flexibility, visibility and can reduce total cost of ownership by over 50%.]]>
Wed, 11 Oct 2017 16:08:14 GMT /SecureAuth2FASSO/webinar-goodbye-rsa-hello-modern-authentication SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) Webinar: Goodbye RSA. Hello Modern Authentication. SecureAuth2FASSO If you are seeking an alternative to RSA’s rigid workflows, costly maintenance and obstructive user experience, there is a better way. SecureAuth has helped hundreds of RSA customers move to an access control solution that offers more flexibility, visibility and can reduce total cost of ownership by over 50%. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webinarrsa-ukoct10-final-171011160815-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> If you are seeking an alternative to RSA’s rigid workflows, costly maintenance and obstructive user experience, there is a better way. SecureAuth has helped hundreds of RSA customers move to an access control solution that offers more flexibility, visibility and can reduce total cost of ownership by over 50%.
Webinar: Goodbye RSA. Hello Modern Authentication. from SecureAuth
]]>
398 5 https://cdn.slidesharecdn.com/ss_thumbnails/webinarrsa-ukoct10-final-171011160815-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Death of 2FA and the Birth of Modern Authentication /slideshow/webinar-the-death-of-2fa-and-the-birth-of-modern-authentication/80268652 webinaridcdeathof2fasept2017final-170928201904
The definitions for two-factor authentication (2FA) or multi-factor authentication (MFA) were born in a different 'day' and based upon technology and approaches that are 20 years old. However, technology has changed. Connectivity has been dramatically improved. Mobility and cloud have considerably increased the number of use cases for authentication. So, our definition of and expectations for authentication also need to change. Keith Graham, CTO of SecureAuth, and Frank Dickson, Research Director at IDC, cover: - The death of 2FA, and why it is not enough or even too much - Looking beyond 2FA to increase security and usability - Modern authentication best practices - How modern authentication can take you passwordless]]>

The definitions for two-factor authentication (2FA) or multi-factor authentication (MFA) were born in a different 'day' and based upon technology and approaches that are 20 years old. However, technology has changed. Connectivity has been dramatically improved. Mobility and cloud have considerably increased the number of use cases for authentication. So, our definition of and expectations for authentication also need to change. Keith Graham, CTO of SecureAuth, and Frank Dickson, Research Director at IDC, cover: - The death of 2FA, and why it is not enough or even too much - Looking beyond 2FA to increase security and usability - Modern authentication best practices - How modern authentication can take you passwordless]]>
Thu, 28 Sep 2017 20:19:04 GMT /slideshow/webinar-the-death-of-2fa-and-the-birth-of-modern-authentication/80268652 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) The Death of 2FA and the Birth of Modern Authentication SecureAuth2FASSO The definitions for two-factor authentication (2FA) or multi-factor authentication (MFA) were born in a different 'day' and based upon technology and approaches that are 20 years old. However, technology has changed. Connectivity has been dramatically improved. Mobility and cloud have considerably increased the number of use cases for authentication. So, our definition of and expectations for authentication also need to change. Keith Graham, CTO of SecureAuth, and Frank Dickson, Research Director at IDC, cover: - The death of 2FA, and why it is not enough or even too much - Looking beyond 2FA to increase security and usability - Modern authentication best practices - How modern authentication can take you passwordless <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webinaridcdeathof2fasept2017final-170928201904-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The definitions for two-factor authentication (2FA) or multi-factor authentication (MFA) were born in a different &#39;day&#39; and based upon technology and approaches that are 20 years old. However, technology has changed. Connectivity has been dramatically improved. Mobility and cloud have considerably increased the number of use cases for authentication. So, our definition of and expectations for authentication also need to change. Keith Graham, CTO of SecureAuth, and Frank Dickson, Research Director at IDC, cover: - The death of 2FA, and why it is not enough or even too much - Looking beyond 2FA to increase security and usability - Modern authentication best practices - How modern authentication can take you passwordless
The Death of 2FA and the Birth of Modern Authentication from SecureAuth
]]>
569 8 https://cdn.slidesharecdn.com/ss_thumbnails/webinaridcdeathof2fasept2017final-170928201904-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Portal Protection Using Adaptive Authentication /slideshow/portal-protection-using-adaptive-authentication-79781052/79781052 portalprotectionusingadaptiveauthentication-170914180139
PORTAL PROTECTION: Raising Security Without Raising Disruptions It's an age-old dilemma: security versus user experience. Traditionally, hardening security adds to the burden on users — they have to authenticate more often or supply additional factors. But many organizations prefer to err on side of the user experience, especially when it comes to protecting portals. But the multiple portal breaches in 2016, including those at ADP, Cisco, and Verizon, might give you pause. In fact, with 81% of reported breaches in 2016 involving the use of stolen or weak credentials, can you continue to sacrifice security for user convenience? The good news is, you don’t have choose. ]]>

PORTAL PROTECTION: Raising Security Without Raising Disruptions It's an age-old dilemma: security versus user experience. Traditionally, hardening security adds to the burden on users — they have to authenticate more often or supply additional factors. But many organizations prefer to err on side of the user experience, especially when it comes to protecting portals. But the multiple portal breaches in 2016, including those at ADP, Cisco, and Verizon, might give you pause. In fact, with 81% of reported breaches in 2016 involving the use of stolen or weak credentials, can you continue to sacrifice security for user convenience? The good news is, you don’t have choose. ]]>
Thu, 14 Sep 2017 18:01:39 GMT /slideshow/portal-protection-using-adaptive-authentication-79781052/79781052 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) Portal Protection Using Adaptive Authentication SecureAuth2FASSO PORTAL PROTECTION: Raising Security Without Raising Disruptions It's an age-old dilemma: security versus user experience. Traditionally, hardening security adds to the burden on users — they have to authenticate more often or supply additional factors. But many organizations prefer to err on side of the user experience, especially when it comes to protecting portals. But the multiple portal breaches in 2016, including those at ADP, Cisco, and Verizon, might give you pause. In fact, with 81% of reported breaches in 2016 involving the use of stolen or weak credentials, can you continue to sacrifice security for user convenience? The good news is, you don’t have choose. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/portalprotectionusingadaptiveauthentication-170914180139-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> PORTAL PROTECTION: Raising Security Without Raising Disruptions It&#39;s an age-old dilemma: security versus user experience. Traditionally, hardening security adds to the burden on users — they have to authenticate more often or supply additional factors. But many organizations prefer to err on side of the user experience, especially when it comes to protecting portals. But the multiple portal breaches in 2016, including those at ADP, Cisco, and Verizon, might give you pause. In fact, with 81% of reported breaches in 2016 involving the use of stolen or weak credentials, can you continue to sacrifice security for user convenience? The good news is, you don’t have choose.
Portal Protection Using Adaptive Authentication from SecureAuth
]]>
133 2 https://cdn.slidesharecdn.com/ss_thumbnails/portalprotectionusingadaptiveauthentication-170914180139-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SecureAuth Solution Enhancements in 2017 /slideshow/secureauth-solution-enhancements-in-2017-79134643/79134643 whatsnewin2017webinarfinalv2-170824203149
Our webinar reviewing the latest enhancements released in SecureAuth IdP 9.1 and SecureAuth Cloud Access. ]]>

Our webinar reviewing the latest enhancements released in SecureAuth IdP 9.1 and SecureAuth Cloud Access. ]]>
Thu, 24 Aug 2017 20:31:49 GMT /slideshow/secureauth-solution-enhancements-in-2017-79134643/79134643 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) SecureAuth Solution Enhancements in 2017 SecureAuth2FASSO Our webinar reviewing the latest enhancements released in SecureAuth IdP 9.1 and SecureAuth Cloud Access. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whatsnewin2017webinarfinalv2-170824203149-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Our webinar reviewing the latest enhancements released in SecureAuth IdP 9.1 and SecureAuth Cloud Access.
SecureAuth Solution Enhancements in 2017 from SecureAuth
]]>
278 5 https://cdn.slidesharecdn.com/ss_thumbnails/whatsnewin2017webinarfinalv2-170824203149-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Passwordless is Possible - How to Remove Passwords and Improve Security /slideshow/passwordless-is-possible-how-to-remove-passwords-and-improve-security/76493138 secureauthpasswordlesswebinarscmag052517-170530165414
According to the latest Verizon Data Breach Report, breaches caused by stolen or weak credentials are on the rise – up to 81% in 2016.  While there is no denying that we need to remove our dependency on the password as a primary method of authentication, the question remains how do we get there? This SC Magazine-hosted Webinar featured SecureAuth CTO Keith Graham discussing how passwordless authentication is possible today, the considerations needed when moving to a password–free world and how removing passwords as your weakest link can increase security while providing a great user experience.]]>

According to the latest Verizon Data Breach Report, breaches caused by stolen or weak credentials are on the rise – up to 81% in 2016.  While there is no denying that we need to remove our dependency on the password as a primary method of authentication, the question remains how do we get there? This SC Magazine-hosted Webinar featured SecureAuth CTO Keith Graham discussing how passwordless authentication is possible today, the considerations needed when moving to a password–free world and how removing passwords as your weakest link can increase security while providing a great user experience.]]>
Tue, 30 May 2017 16:54:13 GMT /slideshow/passwordless-is-possible-how-to-remove-passwords-and-improve-security/76493138 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth2FASSO According to the latest Verizon Data Breach Report, breaches caused by stolen or weak credentials are on the rise – up to 81% in 2016.  While there is no denying that we need to remove our dependency on the password as a primary method of authentication, the question remains how do we get there? This SC Magazine-hosted Webinar featured SecureAuth CTO Keith Graham discussing how passwordless authentication is possible today, the considerations needed when moving to a password–free world and how removing passwords as your weakest link can increase security while providing a great user experience. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/secureauthpasswordlesswebinarscmag052517-170530165414-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> According to the latest Verizon Data Breach Report, breaches caused by stolen or weak credentials are on the rise – up to 81% in 2016.  While there is no denying that we need to remove our dependency on the password as a primary method of authentication, the question remains how do we get there? This SC Magazine-hosted Webinar featured SecureAuth CTO Keith Graham discussing how passwordless authentication is possible today, the considerations needed when moving to a password–free world and how removing passwords as your weakest link can increase security while providing a great user experience.
Passwordless is Possible - How to Remove Passwords and Improve Security from SecureAuth
]]>
384 2 https://cdn.slidesharecdn.com/ss_thumbnails/secureauthpasswordlesswebinarscmag052517-170530165414-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Top 5 Reasons to Choose Adaptive SSO /slideshow/adaptive-sso-webinar-final/75366994 adaptivessowebinarfinal-170424213951
Most organizations recognize the benefits of single sign-on (SSO): Users love it because they have only one password to remember; security teams love it because they can require that one password to be strong; and management loves it because it boosts productivity while reducing password reset calls. But how secure is your SSO? A great user experience sometimes means sacrificing security. And even the strongest passwords won’t protect you from the misuse of stolen credentials. Discuss the shortcomings of traditional SSO and how an adaptive approach can strengthen security while still delivering an amazing user experience.]]>

Most organizations recognize the benefits of single sign-on (SSO): Users love it because they have only one password to remember; security teams love it because they can require that one password to be strong; and management loves it because it boosts productivity while reducing password reset calls. But how secure is your SSO? A great user experience sometimes means sacrificing security. And even the strongest passwords won’t protect you from the misuse of stolen credentials. Discuss the shortcomings of traditional SSO and how an adaptive approach can strengthen security while still delivering an amazing user experience.]]>
Mon, 24 Apr 2017 21:39:51 GMT /slideshow/adaptive-sso-webinar-final/75366994 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) Top 5 Reasons to Choose Adaptive SSO SecureAuth2FASSO Most organizations recognize the benefits of single sign-on (SSO): Users love it because they have only one password to remember; security teams love it because they can require that one password to be strong; and management loves it because it boosts productivity while reducing password reset calls. But how secure is your SSO? A great user experience sometimes means sacrificing security. And even the strongest passwords won’t protect you from the misuse of stolen credentials. Discuss the shortcomings of traditional SSO and how an adaptive approach can strengthen security while still delivering an amazing user experience. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/adaptivessowebinarfinal-170424213951-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Most organizations recognize the benefits of single sign-on (SSO): Users love it because they have only one password to remember; security teams love it because they can require that one password to be strong; and management loves it because it boosts productivity while reducing password reset calls. But how secure is your SSO? A great user experience sometimes means sacrificing security. And even the strongest passwords won’t protect you from the misuse of stolen credentials. Discuss the shortcomings of traditional SSO and how an adaptive approach can strengthen security while still delivering an amazing user experience.
Top 5 Reasons to Choose Adaptive SSO from SecureAuth
]]>
584 6 https://cdn.slidesharecdn.com/ss_thumbnails/adaptivessowebinarfinal-170424213951-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Webinar: Beyond Two-Factor: Secure Access Control for Office 365 /slideshow/webinar-beyond-twofactor-secure-access-control-for-office-365/73503966 o365-2fanotenoughwebinarslidesfinal-170322195433
James Romer, Chief Security Architect, discussed the requirements for achieving secure access control for Office 365, leveraging existing infrastructure and increasing security without compromising your user experience. Explore how to move beyond two-factor authentication towards adaptive authentication which continuously analyzes risk-factors including, geo-location, behavioral biometrics and threat intelligence, to ensure your users are who they say they are.]]>

James Romer, Chief Security Architect, discussed the requirements for achieving secure access control for Office 365, leveraging existing infrastructure and increasing security without compromising your user experience. Explore how to move beyond two-factor authentication towards adaptive authentication which continuously analyzes risk-factors including, geo-location, behavioral biometrics and threat intelligence, to ensure your users are who they say they are.]]>
Wed, 22 Mar 2017 19:54:33 GMT /slideshow/webinar-beyond-twofactor-secure-access-control-for-office-365/73503966 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) Webinar: Beyond Two-Factor: Secure Access Control for Office 365 SecureAuth2FASSO James Romer, Chief Security Architect, discussed the requirements for achieving secure access control for Office 365, leveraging existing infrastructure and increasing security without compromising your user experience. Explore how to move beyond two-factor authentication towards adaptive authentication which continuously analyzes risk-factors including, geo-location, behavioral biometrics and threat intelligence, to ensure your users are who they say they are. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/o365-2fanotenoughwebinarslidesfinal-170322195433-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> James Romer, Chief Security Architect, discussed the requirements for achieving secure access control for Office 365, leveraging existing infrastructure and increasing security without compromising your user experience. Explore how to move beyond two-factor authentication towards adaptive authentication which continuously analyzes risk-factors including, geo-location, behavioral biometrics and threat intelligence, to ensure your users are who they say they are.
Webinar: Beyond Two-Factor: Secure Access Control for Office 365 from SecureAuth
]]>
591 7 https://cdn.slidesharecdn.com/ss_thumbnails/o365-2fanotenoughwebinarslidesfinal-170322195433-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
What's New in SecureAuth IdP in 2017 /slideshow/whats-new-in-secureauth-idp-in-2017-72831784/72831784 whatsnewinidptostart2017-webinarfeb28-170305182619
New technology and enhancements SecureAuth has come out with the last few months.  Some updates include: Phone Number Fraud Prevention  Symbol-to-Accept  Better Security for the VPN Connected Security Alliance And More!]]>

New technology and enhancements SecureAuth has come out with the last few months.  Some updates include: Phone Number Fraud Prevention  Symbol-to-Accept  Better Security for the VPN Connected Security Alliance And More!]]>
Sun, 05 Mar 2017 18:26:19 GMT /slideshow/whats-new-in-secureauth-idp-in-2017-72831784/72831784 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) What's New in SecureAuth IdP in 2017 SecureAuth2FASSO New technology and enhancements SecureAuth has come out with the last few months.  Some updates include: Phone Number Fraud Prevention  Symbol-to-Accept  Better Security for the VPN Connected Security Alliance And More! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whatsnewinidptostart2017-webinarfeb28-170305182619-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> New technology and enhancements SecureAuth has come out with the last few months.  Some updates include: Phone Number Fraud Prevention  Symbol-to-Accept  Better Security for the VPN Connected Security Alliance And More!
What's New in SecureAuth IdP in 2017 from SecureAuth
]]>
394 3 https://cdn.slidesharecdn.com/ss_thumbnails/whatsnewinidptostart2017-webinarfeb28-170305182619-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2017 Predictions: Identity and Security /slideshow/2017-predictions-identity-and-security/71301494 2017predictionswebinarfinal-170123185348
Guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, and Stephen Cox, Chief Security Architect at SecureAuth, discussed the emerging Identity and Access Management Trends for 2017. Learn how these trends will impact your organization and how you can develop an effective Adaptive Authentication Strategy to stay ahead of the trends and cyber attackers. Learn more on these emerging 2017 trends: * The evolution of the threat landscape & emerging threats * What adaptive authentication in 2017 will look like * Why it's time to go passwordless * Types of breaches to watch for in 2017]]>

Guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, and Stephen Cox, Chief Security Architect at SecureAuth, discussed the emerging Identity and Access Management Trends for 2017. Learn how these trends will impact your organization and how you can develop an effective Adaptive Authentication Strategy to stay ahead of the trends and cyber attackers. Learn more on these emerging 2017 trends: * The evolution of the threat landscape & emerging threats * What adaptive authentication in 2017 will look like * Why it's time to go passwordless * Types of breaches to watch for in 2017]]>
Mon, 23 Jan 2017 18:53:48 GMT /slideshow/2017-predictions-identity-and-security/71301494 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) 2017 Predictions: Identity and Security SecureAuth2FASSO Guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, and Stephen Cox, Chief Security Architect at SecureAuth, discussed the emerging Identity and Access Management Trends for 2017. Learn how these trends will impact your organization and how you can develop an effective Adaptive Authentication Strategy to stay ahead of the trends and cyber attackers. Learn more on these emerging 2017 trends: * The evolution of the threat landscape & emerging threats * What adaptive authentication in 2017 will look like * Why it's time to go passwordless * Types of breaches to watch for in 2017 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2017predictionswebinarfinal-170123185348-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, and Stephen Cox, Chief Security Architect at SecureAuth, discussed the emerging Identity and Access Management Trends for 2017. Learn how these trends will impact your organization and how you can develop an effective Adaptive Authentication Strategy to stay ahead of the trends and cyber attackers. Learn more on these emerging 2017 trends: * The evolution of the threat landscape &amp; emerging threats * What adaptive authentication in 2017 will look like * Why it&#39;s time to go passwordless * Types of breaches to watch for in 2017
2017 Predictions: Identity and Security from SecureAuth
]]>
1228 7 https://cdn.slidesharecdn.com/ss_thumbnails/2017predictionswebinarfinal-170123185348-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Why Two-Factor Isn't Enough /slideshow/why-twofactor-isnt-enough/69369783 2faisnotenoughwebinarfinal2-161121190104
If you think you’re safe because you have two-factor authentication protecting your applications and data, you might want to rethink your security strategy. While certain two-factor methods can be secure, others can be easily defeated leaving you vulnerable to attacks. Learn why simple two-factor authentication is not enough and what you can do to make sure you are protected. We'll present a new approach to authentication, which continuously analyzes risk-factors including, geo-location, behavioural biometrics and threat intelligence, to ensure your users are who they say they are.]]>

If you think you’re safe because you have two-factor authentication protecting your applications and data, you might want to rethink your security strategy. While certain two-factor methods can be secure, others can be easily defeated leaving you vulnerable to attacks. Learn why simple two-factor authentication is not enough and what you can do to make sure you are protected. We'll present a new approach to authentication, which continuously analyzes risk-factors including, geo-location, behavioural biometrics and threat intelligence, to ensure your users are who they say they are.]]>
Mon, 21 Nov 2016 19:01:04 GMT /slideshow/why-twofactor-isnt-enough/69369783 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) Why Two-Factor Isn't Enough SecureAuth2FASSO If you think you’re safe because you have two-factor authentication protecting your applications and data, you might want to rethink your security strategy. While certain two-factor methods can be secure, others can be easily defeated leaving you vulnerable to attacks. Learn why simple two-factor authentication is not enough and what you can do to make sure you are protected. We'll present a new approach to authentication, which continuously analyzes risk-factors including, geo-location, behavioural biometrics and threat intelligence, to ensure your users are who they say they are. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2faisnotenoughwebinarfinal2-161121190104-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> If you think you’re safe because you have two-factor authentication protecting your applications and data, you might want to rethink your security strategy. While certain two-factor methods can be secure, others can be easily defeated leaving you vulnerable to attacks. Learn why simple two-factor authentication is not enough and what you can do to make sure you are protected. We&#39;ll present a new approach to authentication, which continuously analyzes risk-factors including, geo-location, behavioural biometrics and threat intelligence, to ensure your users are who they say they are.
Why Two-Factor Isn't Enough from SecureAuth
]]>
416 3 https://cdn.slidesharecdn.com/ss_thumbnails/2faisnotenoughwebinarfinal2-161121190104-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach to Solving the Data Breach Problem /slideshow/secureauth-451-research-webinar-connected-security-a-holistic-approach-to-solving-the-data-breach-problem/67593071 secureauth451connectedsecuritywebinar10-19-161024171834
In 2015 alone, over 3000 cyber attacks were reported globally – with many more never reported or even detected. Enterprises deploy security point solutions in the hopes of stopping a data breach, while savvy attackers work to exploit the whitespace between them. In this webcast, Garrett Bekker, Senior Analyst, Enterprise Security of 451 Research and Stephen Cox, Chief Security Architect of SecureAuth explored how the Connected Security Alliance is bringing together best-of-breed cyber security vendors to close the gap between isolated security products. Originally presented October 19, 2016.]]>

In 2015 alone, over 3000 cyber attacks were reported globally – with many more never reported or even detected. Enterprises deploy security point solutions in the hopes of stopping a data breach, while savvy attackers work to exploit the whitespace between them. In this webcast, Garrett Bekker, Senior Analyst, Enterprise Security of 451 Research and Stephen Cox, Chief Security Architect of SecureAuth explored how the Connected Security Alliance is bringing together best-of-breed cyber security vendors to close the gap between isolated security products. Originally presented October 19, 2016.]]>
Mon, 24 Oct 2016 17:18:34 GMT /slideshow/secureauth-451-research-webinar-connected-security-a-holistic-approach-to-solving-the-data-breach-problem/67593071 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach to Solving the Data Breach Problem SecureAuth2FASSO In 2015 alone, over 3000 cyber attacks were reported globally – with many more never reported or even detected. Enterprises deploy security point solutions in the hopes of stopping a data breach, while savvy attackers work to exploit the whitespace between them. In this webcast, Garrett Bekker, Senior Analyst, Enterprise Security of 451 Research and Stephen Cox, Chief Security Architect of SecureAuth explored how the Connected Security Alliance is bringing together best-of-breed cyber security vendors to close the gap between isolated security products. Originally presented October 19, 2016. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/secureauth451connectedsecuritywebinar10-19-161024171834-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In 2015 alone, over 3000 cyber attacks were reported globally – with many more never reported or even detected. Enterprises deploy security point solutions in the hopes of stopping a data breach, while savvy attackers work to exploit the whitespace between them. In this webcast, Garrett Bekker, Senior Analyst, Enterprise Security of 451 Research and Stephen Cox, Chief Security Architect of SecureAuth explored how the Connected Security Alliance is bringing together best-of-breed cyber security vendors to close the gap between isolated security products. Originally presented October 19, 2016.
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach to Solving the Data Breach Problem from SecureAuth
]]>
286 4 https://cdn.slidesharecdn.com/ss_thumbnails/secureauth451connectedsecuritywebinar10-19-161024171834-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A CISO's Guide to Cyber Liability Insurance /slideshow/a-cisos-guide-to-cyber-liability-insurance/64445582 scmagcyberinsurancepresentation-jul21-final-160727171542
Cyber insurance is not new, in fact it has been around for more than 10 years. Still it remains a complicated issue with confusion about what’s covered and what isn’t. And with incidentals of data breaches rising, so are cyber insurance premiums themselves. One thing is clear: Companies will be breached at some point, if they haven’t been breached already and protecting your organization to minimize financial loss is critical. This ºÝºÝߣShare by SecureAuth and SC Magazine, will discuss what security professionals need to know to ensure they are protected, including: The current state of cyber insurance from a business operations perspective – what is covered and what isn’t What insurance companies look for (ie. people, process, system) regarding your ability to response to an attack How financial reimbursement does not address the real impact of a data breach How adaptive access control can help minimize the potential loss of breached data, reduce CI premiums and keep you ahead of the game]]>

Cyber insurance is not new, in fact it has been around for more than 10 years. Still it remains a complicated issue with confusion about what’s covered and what isn’t. And with incidentals of data breaches rising, so are cyber insurance premiums themselves. One thing is clear: Companies will be breached at some point, if they haven’t been breached already and protecting your organization to minimize financial loss is critical. This ºÝºÝߣShare by SecureAuth and SC Magazine, will discuss what security professionals need to know to ensure they are protected, including: The current state of cyber insurance from a business operations perspective – what is covered and what isn’t What insurance companies look for (ie. people, process, system) regarding your ability to response to an attack How financial reimbursement does not address the real impact of a data breach How adaptive access control can help minimize the potential loss of breached data, reduce CI premiums and keep you ahead of the game]]>
Wed, 27 Jul 2016 17:15:41 GMT /slideshow/a-cisos-guide-to-cyber-liability-insurance/64445582 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) A CISO's Guide to Cyber Liability Insurance SecureAuth2FASSO Cyber insurance is not new, in fact it has been around for more than 10 years. Still it remains a complicated issue with confusion about what’s covered and what isn’t. And with incidentals of data breaches rising, so are cyber insurance premiums themselves. One thing is clear: Companies will be breached at some point, if they haven’t been breached already and protecting your organization to minimize financial loss is critical. This ºÝºÝߣShare by SecureAuth and SC Magazine, will discuss what security professionals need to know to ensure they are protected, including: The current state of cyber insurance from a business operations perspective – what is covered and what isn’t What insurance companies look for (ie. people, process, system) regarding your ability to response to an attack How financial reimbursement does not address the real impact of a data breach How adaptive access control can help minimize the potential loss of breached data, reduce CI premiums and keep you ahead of the game <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/scmagcyberinsurancepresentation-jul21-final-160727171542-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber insurance is not new, in fact it has been around for more than 10 years. Still it remains a complicated issue with confusion about what’s covered and what isn’t. And with incidentals of data breaches rising, so are cyber insurance premiums themselves. One thing is clear: Companies will be breached at some point, if they haven’t been breached already and protecting your organization to minimize financial loss is critical. This ºÝºÝߣShare by SecureAuth and SC Magazine, will discuss what security professionals need to know to ensure they are protected, including: The current state of cyber insurance from a business operations perspective – what is covered and what isn’t What insurance companies look for (ie. people, process, system) regarding your ability to response to an attack How financial reimbursement does not address the real impact of a data breach How adaptive access control can help minimize the potential loss of breached data, reduce CI premiums and keep you ahead of the game
A CISO's Guide to Cyber Liability Insurance from SecureAuth
]]>
509 7 https://cdn.slidesharecdn.com/ss_thumbnails/scmagcyberinsurancepresentation-jul21-final-160727171542-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Rise of California Cybercrime /slideshow/the-rise-of-california-cybercrime/63926974 calireportslidesharev21111-160711214511
California has always been a king of innovation - from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it's not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003. Laws don't stop cybercriminals, though - and California has seen a sharp rise in breaches the last 4 years, according to The California Data Breach Report. Consider these chilling realities: • There were 657 data breaches involving more than 500 records from 2012-2015 - impacting a total of more than 49 million records of Californians. • In 2012, 2.6 million records were impacted; by 2015, that number rose to 24 million. • Nearly 3 out of 5 California residents were victims of a data breach last year. According to the report, every industry is affected: schools, hospitals, restaurants, retailers, banks, hotels, government agencies and more. Any of them can suffer severe consequences, such as brand damage, class action lawsuits, lost business and regulatory fines. Their users and consumers see their social security numbers, payment card data, medical information, driver's license numbers and other personal data fall into criminal hands; according to Javelin Strategy & Research, 67 percent of 2014 breach victims in the U.S. were also victims of fraud. ]]>

California has always been a king of innovation - from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it's not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003. Laws don't stop cybercriminals, though - and California has seen a sharp rise in breaches the last 4 years, according to The California Data Breach Report. Consider these chilling realities: • There were 657 data breaches involving more than 500 records from 2012-2015 - impacting a total of more than 49 million records of Californians. • In 2012, 2.6 million records were impacted; by 2015, that number rose to 24 million. • Nearly 3 out of 5 California residents were victims of a data breach last year. According to the report, every industry is affected: schools, hospitals, restaurants, retailers, banks, hotels, government agencies and more. Any of them can suffer severe consequences, such as brand damage, class action lawsuits, lost business and regulatory fines. Their users and consumers see their social security numbers, payment card data, medical information, driver's license numbers and other personal data fall into criminal hands; according to Javelin Strategy & Research, 67 percent of 2014 breach victims in the U.S. were also victims of fraud. ]]>
Mon, 11 Jul 2016 21:45:11 GMT /slideshow/the-rise-of-california-cybercrime/63926974 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) The Rise of California Cybercrime SecureAuth2FASSO California has always been a king of innovation - from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it's not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003. Laws don't stop cybercriminals, though - and California has seen a sharp rise in breaches the last 4 years, according to The California Data Breach Report. Consider these chilling realities: • There were 657 data breaches involving more than 500 records from 2012-2015 - impacting a total of more than 49 million records of Californians. • In 2012, 2.6 million records were impacted; by 2015, that number rose to 24 million. • Nearly 3 out of 5 California residents were victims of a data breach last year. According to the report, every industry is affected: schools, hospitals, restaurants, retailers, banks, hotels, government agencies and more. Any of them can suffer severe consequences, such as brand damage, class action lawsuits, lost business and regulatory fines. Their users and consumers see their social security numbers, payment card data, medical information, driver's license numbers and other personal data fall into criminal hands; according to Javelin Strategy & Research, 67 percent of 2014 breach victims in the U.S. were also victims of fraud. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/calireportslidesharev21111-160711214511-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> California has always been a king of innovation - from the earliest ventures in filmmaking to today’s Silicon Valley technologies. So it&#39;s not surprising that California has been at the vanguard of cybersecurity, being the first state to enact a breach data notification law in 2003. Laws don&#39;t stop cybercriminals, though - and California has seen a sharp rise in breaches the last 4 years, according to The California Data Breach Report. Consider these chilling realities: • There were 657 data breaches involving more than 500 records from 2012-2015 - impacting a total of more than 49 million records of Californians. • In 2012, 2.6 million records were impacted; by 2015, that number rose to 24 million. • Nearly 3 out of 5 California residents were victims of a data breach last year. According to the report, every industry is affected: schools, hospitals, restaurants, retailers, banks, hotels, government agencies and more. Any of them can suffer severe consequences, such as brand damage, class action lawsuits, lost business and regulatory fines. Their users and consumers see their social security numbers, payment card data, medical information, driver&#39;s license numbers and other personal data fall into criminal hands; according to Javelin Strategy &amp; Research, 67 percent of 2014 breach victims in the U.S. were also victims of fraud.
The Rise of California Cybercrime from SecureAuth
]]>
507 2 https://cdn.slidesharecdn.com/ss_thumbnails/calireportslidesharev21111-160711214511-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 final (1) /slideshow/unmask-anonymous-attackers-with-advanced-threat-intelligence-webinar-629-final-1/63652838 unmaskanonymousattackerswithadvancedthreatintelligencewebinar6-160701180927
With the latest release of SecureAuth IdP, we announced the addition of SecureAuth Threat Service and offered it exclusively to you at 50% off list price! But if you are still not convinced that Threat Service will help you build the most secure environment possible then join us on June 29th for a live webinar with Forrester VP and Principal Analyst, Andras Cser where we will discuss the threats anonymous/Tor networks and the harmful repercussions that can happen in your network.]]>

With the latest release of SecureAuth IdP, we announced the addition of SecureAuth Threat Service and offered it exclusively to you at 50% off list price! But if you are still not convinced that Threat Service will help you build the most secure environment possible then join us on June 29th for a live webinar with Forrester VP and Principal Analyst, Andras Cser where we will discuss the threats anonymous/Tor networks and the harmful repercussions that can happen in your network.]]>
Fri, 01 Jul 2016 18:09:27 GMT /slideshow/unmask-anonymous-attackers-with-advanced-threat-intelligence-webinar-629-final-1/63652838 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) Unmask anonymous attackers with advanced threat intelligence webinar 6.29 final (1) SecureAuth2FASSO With the latest release of SecureAuth IdP, we announced the addition of SecureAuth Threat Service and offered it exclusively to you at 50% off list price! But if you are still not convinced that Threat Service will help you build the most secure environment possible then join us on June 29th for a live webinar with Forrester VP and Principal Analyst, Andras Cser where we will discuss the threats anonymous/Tor networks and the harmful repercussions that can happen in your network. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/unmaskanonymousattackerswithadvancedthreatintelligencewebinar6-160701180927-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With the latest release of SecureAuth IdP, we announced the addition of SecureAuth Threat Service and offered it exclusively to you at 50% off list price! But if you are still not convinced that Threat Service will help you build the most secure environment possible then join us on June 29th for a live webinar with Forrester VP and Principal Analyst, Andras Cser where we will discuss the threats anonymous/Tor networks and the harmful repercussions that can happen in your network.
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 final (1) from SecureAuth
]]>
305 6 https://cdn.slidesharecdn.com/ss_thumbnails/unmaskanonymousattackerswithadvancedthreatintelligencewebinar6-160701180927-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
What's New in IdP 9.0 Behavioral Biometrics and more… /slideshow/whats-new-in-idp-90-behavioral-biometrics-and-more/62154235 whatsnewinidp9-160518180027
We are proud to announce our latest version of SecureAuth™ IdP v9.0. This release marks a milestone in technology advancement for access control and authentication security with the introduction of behavioral biometrics. This groundbreaking new risk analysis technology makes an organization even more secure while improving user experience. The technology performs keystroke and mouse movement analysis to determine a user’s legitimacy without the user noticing, if they don’t match – SecureAuth IdP v9.0 can require multi-factor authentication (MFA) for that login to proceed. SecureAuth is the first identity management vendor to offer this capability as part of a comprehensive risk-based authentication process.]]>

We are proud to announce our latest version of SecureAuth™ IdP v9.0. This release marks a milestone in technology advancement for access control and authentication security with the introduction of behavioral biometrics. This groundbreaking new risk analysis technology makes an organization even more secure while improving user experience. The technology performs keystroke and mouse movement analysis to determine a user’s legitimacy without the user noticing, if they don’t match – SecureAuth IdP v9.0 can require multi-factor authentication (MFA) for that login to proceed. SecureAuth is the first identity management vendor to offer this capability as part of a comprehensive risk-based authentication process.]]>
Wed, 18 May 2016 18:00:27 GMT /slideshow/whats-new-in-idp-90-behavioral-biometrics-and-more/62154235 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) What's New in IdP 9.0 Behavioral Biometrics and more… SecureAuth2FASSO We are proud to announce our latest version of SecureAuth™ IdP v9.0. This release marks a milestone in technology advancement for access control and authentication security with the introduction of behavioral biometrics. This groundbreaking new risk analysis technology makes an organization even more secure while improving user experience. The technology performs keystroke and mouse movement analysis to determine a user’s legitimacy without the user noticing, if they don’t match – SecureAuth IdP v9.0 can require multi-factor authentication (MFA) for that login to proceed. SecureAuth is the first identity management vendor to offer this capability as part of a comprehensive risk-based authentication process. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whatsnewinidp9-160518180027-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We are proud to announce our latest version of SecureAuth™ IdP v9.0. This release marks a milestone in technology advancement for access control and authentication security with the introduction of behavioral biometrics. This groundbreaking new risk analysis technology makes an organization even more secure while improving user experience. The technology performs keystroke and mouse movement analysis to determine a user’s legitimacy without the user noticing, if they don’t match – SecureAuth IdP v9.0 can require multi-factor authentication (MFA) for that login to proceed. SecureAuth is the first identity management vendor to offer this capability as part of a comprehensive risk-based authentication process.
What's New in IdP 9.0 Behavioral Biometrics and more… from SecureAuth
]]>
655 7 https://cdn.slidesharecdn.com/ss_thumbnails/whatsnewinidp9-160518180027-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Stopping Breaches at the Perimeter: Strategies for Secure Access Control /SecureAuth2FASSO/stopping-breaches-at-the-perimeter-strategies-for-secure-access-control 451-research-secureauthstrategies-for-secure-access-control-final-160217214518
Billions are being spent on network and endpoint security each year and yet companies continue to get breached and become big news headlines. So the question remains: How can organizations protect their network and applications while detecting unwanted users and potential attackers? Join 451 Research and SecureAuth as we explore the current state of information security and discuss some of the emerging access control technologies that can help address these challenges. In this informative webinar you will learn: •Why the future of access control will require higher security while improving user experience •How adaptive access control techniques can protect against an attack using multi-layered risk analysis •How using Behavioral Biometrics can identify anomalous user behavior - continuously]]>

Billions are being spent on network and endpoint security each year and yet companies continue to get breached and become big news headlines. So the question remains: How can organizations protect their network and applications while detecting unwanted users and potential attackers? Join 451 Research and SecureAuth as we explore the current state of information security and discuss some of the emerging access control technologies that can help address these challenges. In this informative webinar you will learn: •Why the future of access control will require higher security while improving user experience •How adaptive access control techniques can protect against an attack using multi-layered risk analysis •How using Behavioral Biometrics can identify anomalous user behavior - continuously]]>
Wed, 17 Feb 2016 21:45:18 GMT /SecureAuth2FASSO/stopping-breaches-at-the-perimeter-strategies-for-secure-access-control SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) Stopping Breaches at the Perimeter: Strategies for Secure Access Control SecureAuth2FASSO Billions are being spent on network and endpoint security each year and yet companies continue to get breached and become big news headlines. So the question remains: How can organizations protect their network and applications while detecting unwanted users and potential attackers? Join 451 Research and SecureAuth as we explore the current state of information security and discuss some of the emerging access control technologies that can help address these challenges. In this informative webinar you will learn: •Why the future of access control will require higher security while improving user experience •How adaptive access control techniques can protect against an attack using multi-layered risk analysis •How using Behavioral Biometrics can identify anomalous user behavior - continuously <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/451-research-secureauthstrategies-for-secure-access-control-final-160217214518-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Billions are being spent on network and endpoint security each year and yet companies continue to get breached and become big news headlines. So the question remains: How can organizations protect their network and applications while detecting unwanted users and potential attackers? Join 451 Research and SecureAuth as we explore the current state of information security and discuss some of the emerging access control technologies that can help address these challenges. In this informative webinar you will learn: •Why the future of access control will require higher security while improving user experience •How adaptive access control techniques can protect against an attack using multi-layered risk analysis •How using Behavioral Biometrics can identify anomalous user behavior - continuously
Stopping Breaches at the Perimeter: Strategies for Secure Access Control from SecureAuth
]]>
455 9 https://cdn.slidesharecdn.com/ss_thumbnails/451-research-secureauthstrategies-for-secure-access-control-final-160217214518-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
What’s New In SecureAuth™ IdP, 8.2 /slideshow/whats-new-in-secureauth-idp-82/57573890 idp8-160127191915
Damon Tepe, Director of Product Marketing, and Ryan Rowcliffe, Super Solution Architect, discuss and show release highlights: • Cisco pxGrid support/integration – check if users/identities are logged on to network • Adaptive and Authentication API enhancements – bring strong and adaptive authentication to homegrown applications • Splunk support/integration – visualize real-time feeds from SecureAuth IdP 8.2 • Push-to-Accept – new authentication method • Updated product theme – Clean new sleek design]]>

Damon Tepe, Director of Product Marketing, and Ryan Rowcliffe, Super Solution Architect, discuss and show release highlights: • Cisco pxGrid support/integration – check if users/identities are logged on to network • Adaptive and Authentication API enhancements – bring strong and adaptive authentication to homegrown applications • Splunk support/integration – visualize real-time feeds from SecureAuth IdP 8.2 • Push-to-Accept – new authentication method • Updated product theme – Clean new sleek design]]>
Wed, 27 Jan 2016 19:19:15 GMT /slideshow/whats-new-in-secureauth-idp-82/57573890 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) What’s New In SecureAuth™ IdP, 8.2 SecureAuth2FASSO Damon Tepe, Director of Product Marketing, and Ryan Rowcliffe, Super Solution Architect, discuss and show release highlights: • Cisco pxGrid support/integration – check if users/identities are logged on to network • Adaptive and Authentication API enhancements – bring strong and adaptive authentication to homegrown applications • Splunk support/integration – visualize real-time feeds from SecureAuth IdP 8.2 • Push-to-Accept – new authentication method • Updated product theme – Clean new sleek design <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/idp8-160127191915-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Damon Tepe, Director of Product Marketing, and Ryan Rowcliffe, Super Solution Architect, discuss and show release highlights: • Cisco pxGrid support/integration – check if users/identities are logged on to network • Adaptive and Authentication API enhancements – bring strong and adaptive authentication to homegrown applications • Splunk support/integration – visualize real-time feeds from SecureAuth IdP 8.2 • Push-to-Accept – new authentication method • Updated product theme – Clean new sleek design
What’s New In SecureAuth™ IdP, 8.2 from SecureAuth
]]>
517 9 https://cdn.slidesharecdn.com/ss_thumbnails/idp8-160127191915-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
What to Expect in 2016: Top 5 Predictions for Security and Access Control /slideshow/what-to-expect-in-2016-top-5-predictions-for-security-and-access-control/56222174 forrestersecureauthwebinar2015dec16final2-151216230924
SecureAuth and special guest Forrester Research discuss the trends and strategies that will help you boost security and protect your organization from access threats. In this session, you will hear from Forrester's Andras Cser as he shares the top 5 information security and access control trends to watch for in 2016 and how they will impact your organization. Additionally, Keith Graham, CTO from SecureAuth, will present effective strategies to stay ahead of these trends and protect against advanced cyber attacks with adaptive authentication.]]>

SecureAuth and special guest Forrester Research discuss the trends and strategies that will help you boost security and protect your organization from access threats. In this session, you will hear from Forrester's Andras Cser as he shares the top 5 information security and access control trends to watch for in 2016 and how they will impact your organization. Additionally, Keith Graham, CTO from SecureAuth, will present effective strategies to stay ahead of these trends and protect against advanced cyber attacks with adaptive authentication.]]>
Wed, 16 Dec 2015 23:09:23 GMT /slideshow/what-to-expect-in-2016-top-5-predictions-for-security-and-access-control/56222174 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) What to Expect in 2016: Top 5 Predictions for Security and Access Control SecureAuth2FASSO SecureAuth and special guest Forrester Research discuss the trends and strategies that will help you boost security and protect your organization from access threats. In this session, you will hear from Forrester's Andras Cser as he shares the top 5 information security and access control trends to watch for in 2016 and how they will impact your organization. Additionally, Keith Graham, CTO from SecureAuth, will present effective strategies to stay ahead of these trends and protect against advanced cyber attacks with adaptive authentication. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/forrestersecureauthwebinar2015dec16final2-151216230924-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SecureAuth and special guest Forrester Research discuss the trends and strategies that will help you boost security and protect your organization from access threats. In this session, you will hear from Forrester&#39;s Andras Cser as he shares the top 5 information security and access control trends to watch for in 2016 and how they will impact your organization. Additionally, Keith Graham, CTO from SecureAuth, will present effective strategies to stay ahead of these trends and protect against advanced cyber attacks with adaptive authentication.
What to Expect in 2016: Top 5 Predictions for Security and Access Control from SecureAuth
]]>
1569 7 https://cdn.slidesharecdn.com/ss_thumbnails/forrestersecureauthwebinar2015dec16final2-151216230924-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Stop Cyber Attacks Using Adaptive Authentication /SecureAuth2FASSO/how-to-stop-cyber-attacks-using-adaptive-authentication stopcyberattackersintheirtrackswithadaptiveauth12-151202204433-lva1-app6892
Attacks on organizations are in the news every day. How can your organization keep from becoming tomorrow’s headline? Join SecureAuth as we take a deeper look at how adaptive authentication techniques can enable your organization to stop attackers in their tracks. With live intelligence data as a part of your authentication workflows, you can easily identify suspicious actors before they enter your network, not after they violate a policy. ]]>

Attacks on organizations are in the news every day. How can your organization keep from becoming tomorrow’s headline? Join SecureAuth as we take a deeper look at how adaptive authentication techniques can enable your organization to stop attackers in their tracks. With live intelligence data as a part of your authentication workflows, you can easily identify suspicious actors before they enter your network, not after they violate a policy. ]]>
Wed, 02 Dec 2015 20:44:32 GMT /SecureAuth2FASSO/how-to-stop-cyber-attacks-using-adaptive-authentication SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) How to Stop Cyber Attacks Using Adaptive Authentication SecureAuth2FASSO Attacks on organizations are in the news every day. How can your organization keep from becoming tomorrow’s headline? Join SecureAuth as we take a deeper look at how adaptive authentication techniques can enable your organization to stop attackers in their tracks. With live intelligence data as a part of your authentication workflows, you can easily identify suspicious actors before they enter your network, not after they violate a policy. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stopcyberattackersintheirtrackswithadaptiveauth12-151202204433-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Attacks on organizations are in the news every day. How can your organization keep from becoming tomorrow’s headline? Join SecureAuth as we take a deeper look at how adaptive authentication techniques can enable your organization to stop attackers in their tracks. With live intelligence data as a part of your authentication workflows, you can easily identify suspicious actors before they enter your network, not after they violate a policy.
How to Stop Cyber Attacks Using Adaptive Authentication from SecureAuth
]]>
619 6 https://cdn.slidesharecdn.com/ss_thumbnails/stopcyberattackersintheirtrackswithadaptiveauth12-151202204433-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Balancing User Experience with Secure Access Control in Healthcare /slideshow/balancing-user-experience-with-secure-access-control-in-healthcare/54033426 himsswebcastoct1520151015final-151016162747-lva1-app6891
Managing remote and cloud user access via passwords has always presented challenges. Remote access to EHR/EMR applications through VPNs such as Citrix, by clinical and non-clinical staff must be secured beyond the vulnerable password. But doctors and other users often resist added security measures because they reduce usability. Emerging technologies that help achieve a balance, such as device fingerprinting, will be covered and shown to actually improve the end user experience while still providing Strong, Adaptive Authentication.]]>

Managing remote and cloud user access via passwords has always presented challenges. Remote access to EHR/EMR applications through VPNs such as Citrix, by clinical and non-clinical staff must be secured beyond the vulnerable password. But doctors and other users often resist added security measures because they reduce usability. Emerging technologies that help achieve a balance, such as device fingerprinting, will be covered and shown to actually improve the end user experience while still providing Strong, Adaptive Authentication.]]>
Fri, 16 Oct 2015 16:27:47 GMT /slideshow/balancing-user-experience-with-secure-access-control-in-healthcare/54033426 SecureAuth2FASSO@slideshare.net(SecureAuth2FASSO) Balancing User Experience with Secure Access Control in Healthcare SecureAuth2FASSO Managing remote and cloud user access via passwords has always presented challenges. Remote access to EHR/EMR applications through VPNs such as Citrix, by clinical and non-clinical staff must be secured beyond the vulnerable password. But doctors and other users often resist added security measures because they reduce usability. Emerging technologies that help achieve a balance, such as device fingerprinting, will be covered and shown to actually improve the end user experience while still providing Strong, Adaptive Authentication. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/himsswebcastoct1520151015final-151016162747-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Managing remote and cloud user access via passwords has always presented challenges. Remote access to EHR/EMR applications through VPNs such as Citrix, by clinical and non-clinical staff must be secured beyond the vulnerable password. But doctors and other users often resist added security measures because they reduce usability. Emerging technologies that help achieve a balance, such as device fingerprinting, will be covered and shown to actually improve the end user experience while still providing Strong, Adaptive Authentication.
Balancing User Experience with Secure Access Control in Healthcare from SecureAuth
]]>
954 4 https://cdn.slidesharecdn.com/ss_thumbnails/himsswebcastoct1520151015final-151016162747-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-SecureAuth2FASSO-48x48.jpg?cb=1594179645 SecureAuth eliminates identity-related breaches through the continuous assessment of risk and the enablement of trust across identities. The company is a leader in access management, identity governance, and penetration testing. SecureAuth’s highly flexible Identity Security Automation platform redefines security through identity making it easier for organizations to prevent the misuse of credentials. To learn more, visit www.secureauth.com. https://www.secureauth.com/ https://cdn.slidesharecdn.com/ss_thumbnails/webinarrsa-ukoct10-final-171011160815-thumbnail.jpg?width=320&height=320&fit=bounds SecureAuth2FASSO/webinar-goodbye-rsa-hello-modern-authentication Webinar: Goodbye RSA. ... https://cdn.slidesharecdn.com/ss_thumbnails/webinaridcdeathof2fasept2017final-170928201904-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/webinar-the-death-of-2fa-and-the-birth-of-modern-authentication/80268652 The Death of 2FA and t... https://cdn.slidesharecdn.com/ss_thumbnails/portalprotectionusingadaptiveauthentication-170914180139-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/portal-protection-using-adaptive-authentication-79781052/79781052 Portal Protection Usin...