Security teams face a variety of challenges and limitations when deploying a cloud-based platform like O365. To ensure secure access, organisations need to rely on more than just exposing the Active Directory username and password to the Cloud. Two-factor authentication is the default in most cases, but even 2FA has its risks with some second factors susceptible to hacks.
This is something which every company will need to be aware of when making the transition to cloud based software. To discover how to ensure credentials are not being exposed and individuals are who they say they are, even from an untrusted device then listen to our 45 minute Webinar. Run in association with SecureAuth, it covered mobile security including how to:
- Achieve secure access control for Office 365 whilst leveraging existing infrastructure without compromising user experience
- Move beyond two-factor authentication and towards adaptive authentication which continuously analyses risk-factors including geo-location, behavioural biometrics and threat intelligence.
Plus, in a live demonstration of the software you can see what happened when SecureAuth’s Chief Security Architect James Romer logged onto his O365 account from a trusted browser and an untrusted browser.