Understanding the need for best practices in enterprise authentication

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

When an employee or partner accesses a corporate network through an extranet, remote access gateway (VPN) or desktop, they have effectively opened a door to the organisation's most sensitive data assets, intellectual property and customer data.

The security of the network and desktops are only as strong as the authentication method implemented, highlighting the importance of executing this properly.

And yet a one-size-fits-all approach to authentication does not work. Each organisation is unique, as are the requirements of its internal users, partners and customers.

Join us for an entertaining and insightful webinar that will highlight some of the security issues – and solutions to those issues – as they relate to major company authentication.

Along the way we’ll look at the current state of the enterprise authentication market, the current industry trends and the best practices for organisations that are looking to roll out or extend an enterprise authentication solution across their IT systems.

Our panel of experts will review some of the key issues that organisations need to address in order to better defend their IT assets, focusing on the need for authentication, the growth of mobile devices in the corporate environment, and the convergence currently taking place in our growing industry.

This webinar is for:

  • IT professionals wanting to better understand the security issues that their mobile workers experience
  • Managers looking at the problems - and solutions to those problems - that the mobile workforce creates
  • IT workers looking to better protect their digital data resources
  • Anyone wanting to understand the increasingly complex nature of mobile workforce security

 CISSP SSCP logo
CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

Speakers

Steve Gold

Infosecurity Magazine

Mike Moir

Senior Product Manager, Entrust

Photo of Peter Wood

Peter Wood

Partner and Lead Consultant, Naturally Cyber LLP

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.