How to Make Access to your Sensitive Data More Secure - The Easy Way

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Sensitive data is shared more than ever, through cloud services and via remote access as more and more employees use their mobile devices for work.

This brings practical advantages, but brings more risk of identity theft, data breaches and outages.

A security challenge faced by enterprises is that passwords are not enough. Multi-factor authentication is critical. But businesses looking to implement multi-factor identification need to balance improved security with its costs and the potential burden on the IT department.

In this webinar we will examine:

  • The different existing methods of two-factor authentication with their pros and cons;
  • The benefits of using digital certificates (Certificate-based authentication provides users with the strength and benefit of two-factor with no additional effort required) and how it works;
  • How to implement a secure access to all users for internal networks, cloud services and mobile devices;
  • How to implement a strong identity verification in a scalable manner to accommodate growth.

Speakers

Photo of Alan Goode

Alan Goode

Managing Director, Goode Intelligence

Photo of Lila Kee

Lila Kee

Chief Product & Marketing Officer, GMO GlobalSign

Photo of Stephen Pritchard

Stephen Pritchard

Freelance Writer, Infosecurity Magazine

Photo of Mark Ridley

Mark Ridley

Director of Technology, Reed.co.uk

Photo of Amar Singh

Amar Singh

CISO and Founder Cyber Management Alliance and Give01Day, Cyber Management Alliance

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.