Presented June 9, 2017, this webinar reviewed the guidelines set out by the State of New York in 23 NYCRR 500, including minimum requirements for access control, breach remediation, and cybersecurity programs. We discussed risk-based authentication and how can it detect anomalies or changes in patterns to require additional user verification, and how SecureAuth’s Adaptive Authentication helps detect the use of compromised credentials and speed breach remediation.
When looking at identity security solutions for your organization, you may find that many vendors offer native multi-factor authentication (MFA - also known as 2-factor authentication, or 2FA). When presented with the ability to do this by the app in question, why would you look at any other solutions? This is especially true when the product in question offers what seems to be "good enough" protection in the first place.
Robert Block, SecureAuth Sr. Vice President for Identity Strategy talks to CyberScoop about why two-factor authentication is cumbersome for organization's employees and how adaptive authentication is a better way for users and security
According to IDC, two-factor authentication (2FA) and multi-factor authentication (MFA) were born in a 'different day” and are based on technology that is now 20 years old. Organizations are encouraged to look at modern authentication solutions that adjust based on the level of risk, are invisible to users and remove dependency on the unreliable password.
Today, we are excited to announce that SecureAuth and Core Security are merging to become one company. Core Security is a leader in vulnerability discovery, identity governance, and threat management, which is highly complementary to the identity security technology SecureAuth pioneered and continues to be a leader in today. Together, our mission is to accomplish what no other security technology vendor can claim: Secure the enterprise across all major threat vectors with an identity-based approach to the attack lifecycle.
Protect your consumer, employee or partner portal against identity-based threats without unjustifiably interrupting your users. Read this solution brief to learn more about SecureAuth adaptive access control for portal protection.
It’s easy to understand why Office 365 is the most widely used cloud service in the world: applications are constantly updated, it’s easy-to-use, and comes at a relatively low cost. It’s also a prime target for would-be attackers. Chances are, your business is not only already at risk—your data is already threatened. One study reports that virtually every organization experiences at least one cloud-based threat each month and the average has soared to nearly six incidents every week.