SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
SecureAuth:*
What’s*New*to*Start*2017?
Jeff*Hickman*|*Solution*Engineer
Damon*Tepe*|*Director,*Product*Marketing*
February,*2017
SecureAuth*IdP Enhancements*AtMAMGlance
Q3
2016
Q4
2016
Q1
2017
IdP(9.0.1 IdP(9.0.2
RADIUS(2.2 SymbolEtoEAccept
• Connected(Security(
Alliance(Integrations
• RBAC
• Phone(Number(Fraud(
Prevention
• Improved(Device(
Recognition
• MFA(choice(persistence
SecureAuth*IdP 9.0.1
What’s(New(
In(Release(9.0.1?
Connected(Security(Alliance(
Integrations
Privileged*Account*Security
Identity*Governance
User*Entity*Behavior*Analytics*
(UEBA)
RoleEBased(Access(Control((RBAC)
+ Industry’s#first#focused#Alliance#
+ Eliminate#the#whitespace
+ Vendors#work#together
+ All#solutions#integrated
+ Reference#architecture#
+ GOAL:#Protect. Detect. Remediate.
Connect*Security*Alliance*Approach
Benefits(of(a(Holistic(Approach:
Truly(Integrated(Framework
Actionable(Intelligence
Foundation(of(Identity
Better(Together
Connected*Security*– Closing*The*Gaps
Exabeam#correlates#events#from#
a#variety#of#sources#to#determine#
risk#around#user#behavior
SecureAuth#provides#Exabeam#with#
rich#data#regarding#user#activity
Exabeam#provides#SecureAuth#
with#organization#specific#risk#
around#abnormal#user#behavior SecureAuth#protects#access#to#CyberArk#
privileged#account#management#functions
SailPoint correlates#events#from#a#
variety#of#sources#to#determine#risk#
around#user#access#to#critical#systems
Learn(More(@#www.secureauth.com/connectedMsecurity
+ Role#Based#Access#Control#(RBAC)
+ Often#a#requirement#for#larger#IT#teams
+ Allows#IdP#to#provide#different#
administrative#teams/roles,#different#
administrative#access
ADDITIONAL#FEATURE
IdP 9.0.1
RADIUS*2.2
Adaptive(
Authentication
+ Leverages*radius*attributes*passed*from*VPN*
devices*to*perform*preMauthentication*risk*
checks.
+ Cisco,*Citrix*NetScaler,*Pulse*Secure,*and*Palo*
Alto*all*pass*IP*Addresses*of*the*connecting*
user.
+ Provides*the*following*Adaptive*
Authentication*features:
+ Group*Filtering
+ Country/IP*Filtering
+ GeoMVelocity
+ IP*Reputation/Threat*
! Adaptive(Authentication
! Vendor(Specific(Attributes
! Customizable(Verbiage
! NetMotionSupport
Radius#Server
Vendor(Specific(
Attributes
+ Allows*extensions*to*the*standard*RFC*
defined*RADIUS*attributes.
+ Enables*unique*features*to*the*RADIUS*
platform,*such*as*displaying*preMlogon*
messages,*group*restrictions,*among*others
! Adaptive(Authentication
! Vendor(Specific(Attributes
! Customizable(Verbiage
! NetMotionSupport
Radius#Server
Customizable(Verbiage
+ Customize*the*text*that*is*shown*to*the*end*
user*on*the*RADIUS*client*device*(such*as*a*
VPN).
+ Brand,*inform,*and*educate*end*users*with*
custom*messages.
! Adaptive(Authentication
! Vendor(Specific(Attributes
! Customizable(Verbiage
! NetMotionSupport
RADIUS
NetMotion Support
+ Supports*NetMotion’s unique*Mobile*VPN*
solution.
+ Widely*used*in*Law*Enforcement,*Public*
Utilities,*and*anyone*with*a*large*mobile*
work*force*who*always*need*to*be*
connected.*
! Adaptive(Authentication
! Vendor(Specific(Attributes
! Customizable(Verbiage
! NetMotionSupport
RADIUS
SecureAuth*IdP*9.0.2
What’s(New(
In(Release(9.0.2?
Phone(Number(Fraud(Prevention
Ported*Status*blocking
Carrier*Network*blocking
Class*of*phone*blocking
OTP*Spam*Prevention
Noteworthy(Enhancements
Improved*Device*Recognition*
scoring*logic
2nd factor*persistence
PHONE(
NUMBER(
FRAUD(
PREVENTION
OTP(Spam(
Prevention
Block(by(Carrier(
Network
Block(Recently(
Ported(Numbers
Block(by(Number(
Class• Secure#PhoneMbased#
Authentication#&#Comply#with#
NIST#standards
• A(component(of(SecureAuth
Adaptive(Authentication
Regulate#number#of#OTPs#
allowed
Block#by#global#carrier#
networks
Number#been#ported#
without#consent?
Block#by#phone#number#
class
Block(Recently(Ported(
Phone(Numbers
+ Attackers*will*port*a*legitimate*phone*
number,*from*a*legitimate*user,*to*a*new*
device
+ Attacker*will*then*use*newly*ported*phone*
number*in*an*authentication*process
+ SecureAuth detects*if*a*phone*number*has*
recently*been*ported
+ SecureAuth prevents*authentication*using*
that*number*until*the*porting*has*been*
verified*by*the*end*user
! Ported(Number(blocking
! Carrier(Network(blocking
! Number(Class(blocking
! Prevent(OTP(spamming
Block(By Carrier(
Network
+All*numbers*are*associated*with*a*
carrier*network
+There*are*hundreds*of*carrier*
networks*globally*(e.g.*Verizon,*
AT&T)
+SecureAuth detects*what*carrier*a*
specific*number*is*associated*with
+SecureAuth allows*customers*to*
block*particular*carrier*networks*by*
network*or*by*country
! Ported(Number(blocking
! Carrier(Network(blocking
! Number(Class(blocking
! Prevent(OTP(spamming
Block(By Phone(
Number(Class
+All*numbers*are*associated*with*a*
class*of*phone*(e.g.*Virtual,*Mobile,*
Landline)
+SecureAuth detects*what*class*a*
specific*number*is
+SecureAuth allows*customers*to*
block*particular*phone*class(s)*from*
use*during*authentication
! Ported(Number(blocking
! Carrier(Network(blocking
! Number(Class(blocking
! Prevent(OTP(spamming
OTP(Spam(Prevention
+Attackers*will*attempt*to*brute*force*
the*authentication*process
+SecureAuth allows*admins*to*
regulate*number*of*OTPs*allowed
+Provides*a*layer*of*protection*while*
not*spamming*the*user*with*10’s*or*
100’s*of*OTPs!
! Ported(Number(blocking
! Carrier(Network(blocking
! Number(Class(blocking
! Prevent(OTP(spamming
More(9.0.2(
Noteworthy(
Enhancements(
IMPROVED*DEVICE*
RECOGNITION*SCORING*LOGIC
More*accurate*Device,
Recognition,*adapting*to*
changes*in*browser*technology*
SECOND*FACTOR*PERSISTENCE*
Better*end*user*experience*
SymbolMtoMAccept
+ Push#to#Accept#is#a#commonly#used#authentication#method
+ Organizations#and#users#like#it#because#it’s#quick#and#easy
+ Typical#Push%to%Acceptworkflow:
Review*– Push4to4Accept
CLOUD
ONEPREM
Commercial#&
Homegrown#Resources
+ Resources
Very#Susceptible#to#phishing….#
- Users#“Just#Press#Accept”#when#prompted
Here’s#how#it#works…
- Attacker#obtains#UN/PW#
- Attacker#browses#to#a#web#resource#(e.g.#VPN)#&#
begins#login#process
- 2FA/MFA#authentication#system#sends#a#notification#
to#legitimate#user
- Legitimate#user#“robotically”#presses#“Accept”
- Attacker#gains#access#with#only#UN/PW
The*Problem*with*Push4to4Accept
https://youtu.be/vcA6dLl5Sa4?t=30m38s
SYMBOLETOEACCEPT
GOAL:#Prevent'User'from''
“Just'Pressing'Accept”
+ Present#user#with#image#M match#that#
image#on#the#mobile#app
+ User#must#match#what#they#see#on#their#
computer#to#“approve”#the#transaction
+ Human#perspective;#very#effective#
because#the#user#must#know#what#to#pick#
+ Very#unlikely#user#would#guess#if#received#
an#unsolicited#push#notification
Cloud*Access
SecureAuth(
Cloud Access
+ A*path*toward*cloud*(Hybrid)
+ User*convenience*/*credential*
reduction
+ One*of*largest*support*app*libraries*
with*8000+
+ Has*both*Adaptive*and*MultiMfactor*
authentication
+ Easy*to*deploy*and*administer
www.secureauth.com/cloudEaccess
START%YOUR%FREE%TRIAL
THANK%YOU
Copyright*SecureAuth Corporation*2017
The#intellectual#content#within#this#document#is#the#property#of#SecureAuth
and#must#not#be#shared#without#prior#consent.

Weitere ähnliche Inhalte

Was ist angesagt?

Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...NetworkCollaborators
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureNetworkCollaborators
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)Priyanka Aash
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)Priyanka Aash
 
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)Priyanka Aash
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXNetworkCollaborators
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Priyanka Aash
 

Was ist angesagt? (7)

Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
 
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
 

Andere mochten auch

Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
Taller de quimica organica segundo nivel 2017
Taller de quimica organica segundo nivel 2017Taller de quimica organica segundo nivel 2017
Taller de quimica organica segundo nivel 2017sandro javier espin espin
 
Clustered data ontap_8.3_physical_storage
Clustered data ontap_8.3_physical_storageClustered data ontap_8.3_physical_storage
Clustered data ontap_8.3_physical_storageMohan Sati
 
คำสั่งควบคุมโปรแกรม
คำสั่งควบคุมโปรแกรม คำสั่งควบคุมโปรแกรม
คำสั่งควบคุมโปรแกรม BoOm mm
 
Prezentare marta sms bucuresti 2017
Prezentare marta  sms bucuresti 2017Prezentare marta  sms bucuresti 2017
Prezentare marta sms bucuresti 2017RevistaBiz
 
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...Amazon Web Services
 
Finance in Dorset 2017 - Start Up Session
Finance in Dorset 2017 - Start Up Session Finance in Dorset 2017 - Start Up Session
Finance in Dorset 2017 - Start Up Session PKF Francis Clark
 
Unit 3 - Egyptian art and architecture
Unit 3 - Egyptian art and architectureUnit 3 - Egyptian art and architecture
Unit 3 - Egyptian art and architectureJaimeAlonsoEdu
 
Lumière sur... le métier de conseiller communication ministériel
Lumière sur... le métier de conseiller communication ministérielLumière sur... le métier de conseiller communication ministériel
Lumière sur... le métier de conseiller communication ministérielDamien ARNAUD
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlSecureAuth
 
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013Amazon Web Services
 
Mapa mental cooperativas
Mapa mental cooperativasMapa mental cooperativas
Mapa mental cooperativasRonny Ocanto
 

Andere mochten auch (18)

Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Taller de quimica organica segundo nivel 2017
Taller de quimica organica segundo nivel 2017Taller de quimica organica segundo nivel 2017
Taller de quimica organica segundo nivel 2017
 
Clustered data ontap_8.3_physical_storage
Clustered data ontap_8.3_physical_storageClustered data ontap_8.3_physical_storage
Clustered data ontap_8.3_physical_storage
 
คำสั่งควบคุมโปรแกรม
คำสั่งควบคุมโปรแกรม คำสั่งควบคุมโปรแกรม
คำสั่งควบคุมโปรแกรม
 
Prezentare marta sms bucuresti 2017
Prezentare marta  sms bucuresti 2017Prezentare marta  sms bucuresti 2017
Prezentare marta sms bucuresti 2017
 
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
 
Finance in Dorset 2017 - Start Up Session
Finance in Dorset 2017 - Start Up Session Finance in Dorset 2017 - Start Up Session
Finance in Dorset 2017 - Start Up Session
 
Unit 3 - Egyptian art and architecture
Unit 3 - Egyptian art and architectureUnit 3 - Egyptian art and architecture
Unit 3 - Egyptian art and architecture
 
Lumière sur... le métier de conseiller communication ministériel
Lumière sur... le métier de conseiller communication ministérielLumière sur... le métier de conseiller communication ministériel
Lumière sur... le métier de conseiller communication ministériel
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
Lab thesis
Lab thesis Lab thesis
Lab thesis
 
Química orgánica SHT
Química orgánica SHTQuímica orgánica SHT
Química orgánica SHT
 
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
 
Question 7
Question 7Question 7
Question 7
 
Mapa mental cooperativas
Mapa mental cooperativasMapa mental cooperativas
Mapa mental cooperativas
 

Ähnlich wie What's New in SecureAuth IdP in 2017

What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…SecureAuth
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramDeborah Schalm
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program DevOps.com
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
Droidstat-X, Android Applications Security Analyser Xmind Generator
Droidstat-X, Android Applications Security Analyser Xmind GeneratorDroidstat-X, Android Applications Security Analyser Xmind Generator
Droidstat-X, Android Applications Security Analyser Xmind GeneratorCláudio André
 
Live Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applicationsLive Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applicationsSnapLogic
 
How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?Bijal (Bee) Hayes-Thakore
 
南部智慧醫療專班結業式_執行長談話
南部智慧醫療專班結業式_執行長談話南部智慧醫療專班結業式_執行長談話
南部智慧醫療專班結業式_執行長談話AI.academy
 
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...Mobile Trends
 
Solving Enteprise Mobility Considerations with Telerik Mobile Platform
Solving Enteprise Mobility Considerations with Telerik Mobile PlatformSolving Enteprise Mobility Considerations with Telerik Mobile Platform
Solving Enteprise Mobility Considerations with Telerik Mobile PlatformLohith Goudagere Nagaraj
 
C++ Webinar "Why Should You Learn C++ in 2021-22?"
C++ Webinar "Why Should You Learn C++ in 2021-22?"C++ Webinar "Why Should You Learn C++ in 2021-22?"
C++ Webinar "Why Should You Learn C++ in 2021-22?"GlobalLogic Ukraine
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptxArthur528009
 
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...Einat Shimoni
 
Tales from an Enterprise DevOps transformation
Tales from an Enterprise DevOps transformationTales from an Enterprise DevOps transformation
Tales from an Enterprise DevOps transformationLee Eason
 
SplunkLive! Hamburg / München Beginner Session
SplunkLive! Hamburg / München Beginner SessionSplunkLive! Hamburg / München Beginner Session
SplunkLive! Hamburg / München Beginner SessionGeorg Knon
 
TST - CATIA V5 Time Saving Toolbar
 TST - CATIA V5 Time Saving Toolbar TST - CATIA V5 Time Saving Toolbar
TST - CATIA V5 Time Saving ToolbarFernando Petre
 
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...Rien van den Bosch
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkGerardo Pardo-Castellote
 
IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Italy
 

Ähnlich wie What's New in SecureAuth IdP in 2017 (20)

What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Droidstat-X, Android Applications Security Analyser Xmind Generator
Droidstat-X, Android Applications Security Analyser Xmind GeneratorDroidstat-X, Android Applications Security Analyser Xmind Generator
Droidstat-X, Android Applications Security Analyser Xmind Generator
 
Live Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applicationsLive Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applications
 
MindMeister and SaaS
MindMeister and SaaSMindMeister and SaaS
MindMeister and SaaS
 
How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?
 
南部智慧醫療專班結業式_執行長談話
南部智慧醫療專班結業式_執行長談話南部智慧醫療專班結業式_執行長談話
南部智慧醫療專班結業式_執行長談話
 
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
 
Solving Enteprise Mobility Considerations with Telerik Mobile Platform
Solving Enteprise Mobility Considerations with Telerik Mobile PlatformSolving Enteprise Mobility Considerations with Telerik Mobile Platform
Solving Enteprise Mobility Considerations with Telerik Mobile Platform
 
C++ Webinar "Why Should You Learn C++ in 2021-22?"
C++ Webinar "Why Should You Learn C++ in 2021-22?"C++ Webinar "Why Should You Learn C++ in 2021-22?"
C++ Webinar "Why Should You Learn C++ in 2021-22?"
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
 
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
 
Tales from an Enterprise DevOps transformation
Tales from an Enterprise DevOps transformationTales from an Enterprise DevOps transformation
Tales from an Enterprise DevOps transformation
 
SplunkLive! Hamburg / München Beginner Session
SplunkLive! Hamburg / München Beginner SessionSplunkLive! Hamburg / München Beginner Session
SplunkLive! Hamburg / München Beginner Session
 
TST - CATIA V5 Time Saving Toolbar
 TST - CATIA V5 Time Saving Toolbar TST - CATIA V5 Time Saving Toolbar
TST - CATIA V5 Time Saving Toolbar
 
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
 
IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017
 

Mehr von SecureAuth

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.SecureAuth
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationSecureAuth
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationSecureAuth
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security SecureAuth
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOSecureAuth
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughSecureAuth
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceSecureAuth
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime SecureAuth
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...SecureAuth
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2SecureAuth
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationSecureAuth
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareSecureAuth
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...SecureAuth
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureSecureAuth
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern ArchitecturesSecureAuth
 

Mehr von SecureAuth (18)

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 

Kürzlich hochgeladen

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

What's New in SecureAuth IdP in 2017