Für ein bestmögliches Web-Erlebnis verwenden Sie IE11+, Chrome, Firefox oder Safari.

Authentication Myths That Put Your Company at Risk

Authentication Myths That Put Your Company at Risk
Aufgezeichnete
  • Datum der Aufzeichnung:Oct. 15, 2024
  • Veranstaltung:Aufgezeichnete
Authentication Myths That Put Your Company at Risk

Join this webinar to:

  • Understand the limitations of relying solely on MFA for security
  • Learn how to classify risk by application and data access for better authentication strategies
  • Explore advanced authentication and dynamic risk flow implementation
  • Develop strategies to mitigate lateral movement risks within your organization
  • Gain insights into creating tailored authentication options for different user communities
  • Discover the importance of continuous authentication beyond initial session creation
  • Understand the nuances of various authentication methods, including SMS and email

Speakers
Paul Fisher, Lead Analyst at KuppingerCole, will moderate this insightful session. He will guide the discussion, ensuring that key authentication myths are thoroughly examined, and that practical, actionable insights are shared with the audience. His expertise will help frame the conversation within the broader context of identity and access management.

Stuart Sharp and Alicia Townsend from One Identity will investigate common authentication myths, such as the adequacy of MFA alone and the perceived security of certain authentication methods. They will provide strategies for identifying user communities, classifying risk by application, and developing dynamic authentication flows to reduce lateral movement risks and enhance overall security.

Kostenlosen Webcast ansehen

Bitte warten...

triangle-down check
Durch den Download erklären Sie sich automatisch mit den Erhalt von Marketing-E-Mails einverstanden. Um sich vom Erhalt von Marketing-E-Mails abzumelden, befolgen Sie einfach die Anweisungen in unserer Datenschutzerklärung.

Diese Seite ist reCAPTCHA-geschützt. Hier finden Sie die Datenschutzerklärung und die Nutzungsbedingungen von Google.