Fantastic Four: The Four Superpowers Your Access Management Needs

September 28, 2016 from 03:00 PM – 04:00 PM UTC
|

Did you know half of all data breaches exploited legitimate passwords? Now more than ever, access management is necessary to stop enemies from gaining unauthorized access to your environment.

View this on demand webinar to hear Kevin Tolly, Founder of The Tolly Group, and Dr. Angelika Steinacker, IBM European Leader for Identity & Access Management, engage in a technical discussion around the top four superpowers your access management solution needs.

Register here

Web protection effectiveness: The invisible woman, our force field protector

  • Did you know web applications are often the most vulnerable part of a company’s infrastructure? Ensure your access management can create a strong force field protecting against common attack vectors, such as those defined by the Open Web Application Security Project.

Federation: The human torch, fiercely resistant

  • Strong federation creates resistance because it lets users log into their favorite web apps using corporate credentials, while standing resistant to the whole new set of security concerns when authenticating to external SaaS applications. Look for solutions that have support for protocols such as SAML 2.0 and connectors to popular SaaS applications.

Risk-based access: Mister Fantastic, our malleable superhero

  • Sometimes authenticating a user by verifying their username and password is simply not enough.  You need to be able to consider authentication factors that go beyond username and password, such as location, time and device.  Additional factors like these can help to determine whether a request should be authorized, challenged or denied.

Mobile access management: Thing, the street fighter

  • With programs like BYOD and working from home, it is more important than ever to take the fight to the streets. Ensure you can support your workforce, even when access requests are not coming from a corporate device or network.

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today