Training

Identity & Access Management , Network Firewalls, Network Access Control , Security Operations

Not All MFAs are Created Equal, Some MFAs are More Equal than Others.

Not All MFAs are Created Equal, Some MFAs are More Equal than Others.

"Never trust, always verify" is the basis of zero trust. However, as long as the alphanumeric password is being used, no network can genuinely claim it is compliant with that principle. While random password generators within browsers and stricter password policies have slightly improved security, they don't solve the issue of verifying the user's identity. Traditional MFA has become the de facto method of increasing network security. But it doesn't truly make things any more secure?

Join our discussion as CISOs from leading, cloud-first enterprises discuss the impact of your Zero Trust strategy when identity and the endpoint are the new security perimeter.

Discussion topics will also include:

  • The convergence of security and identity
  • The role of increasing use of endpoint devices
  • Continuous authentication

Webinar Registration

This webinar is available OnDemand.

View Now


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.