Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Understanding the need for best practices in enterprise authentication

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

When an employee or partner accesses a corporate network through an extranet, remote access gateway (VPN) or desktop, they have effectively opened a door to the organisation's most sensitive data assets, intellectual property and customer data.

The security of the network and desktops are only as strong as the authentication method implemented, highlighting the importance of executing this properly.

And yet a one-size-fits-all approach to authentication does not work. Each organisation is unique, as are the requirements of its internal users, partners and customers.

Join us for an entertaining and insightful webinar that will highlight some of the security issues – and solutions to those issues – as they relate to major company authentication.

Along the way we’ll look at the current state of the enterprise authentication market, the current industry trends and the best practices for organisations that are looking to roll out or extend an enterprise authentication solution across their IT systems.

Our panel of experts will review some of the key issues that organisations need to address in order to better defend their IT assets, focusing on the need for authentication, the growth of mobile devices in the corporate environment, and the convergence currently taking place in our growing industry.

This webinar is for:

  • IT professionals wanting to better understand the security issues that their mobile workers experience
  • Managers looking at the problems - and solutions to those problems - that the mobile workforce creates
  • IT workers looking to better protect their digital data resources
  • Anyone wanting to understand the increasingly complex nature of mobile workforce security

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.


Steve Gold

Steve Gold, Infosecurity Magazine

    Mike Moir

    Mike Moir Senior Product Manager, Entrust

      Peter Wood

      Peter Wood CEO, First Base Technologies