Sponsor: Cisco Systems, Inc.

Building an Identity Security Program

Identity security is critical in today’s remote work and SaaS era, and poor identity security hygiene can leave companies vulnerable to cyberattacks. However, many organizations struggle to know what’s required for an effective identity security program. Cisco Duo's handbook provides practical guidance on aligning goals, building capabilities, and focusing on key outcomes.

View Now

Identity Under Siege: Strategies for Enhancing Security in a Zero Trust World

With an industry-wide move to a zero trust security approach, the user’s identity has become the new security perimeter. Data from breach investigation reports clearly shows how the attackers have adapted and followed this shift. Most breaches today have an identity component and the identity is now under attack. So what happens next? In this webinar we look at why these attacks succeed, how you can gain better visibility into the true identity security posture of your systems, and how the authentication processes can be hardened with new and existing tools.

View Now

SANS Webinar: Securely Moving to the (Government) Cloud

Hear from SANS Analyst Matt Bromiley and Christian Clasen, Technical Marketing Engineer from Cisco, as they discuss federal agencies and their transition to cloud-based resources. They will review key rules and regulations that agencies should be aware of, how to plan and deal with the “new normal” and highlight solutions to common difficulties. Finally, they will review ways to securely enable and empower a smooth, cloud-first transition.

View Now

How Attackers Steal Credentials to Gain Stealthy Access to Your Organization

You’ve no doubt heard the phrase, “Attackers don’t hack anyone these days. They log on.” By obtaining (or stealing) valid user account details, an attacker can gain access to a system, remain hidden, and then elevate their privileges to “log in” to more areas of the network. To illustrate ways in which security practitioners can help defend against the techniques employed in credential stealing attacks, this webinar will break down an identity attack piece by piece.

View Now

Forrester Total Economic Impact of Cisco Duo Case Study

Cisco Secure Access by Duo uses a multi-layered approach to secure access to applications in the cloud or on-premises with multifactor authentication, single sign-on, and device posture checks. To better understand the true cost and value of integrating Duo, Cisco commissioned a Total Economic Impact™ (TEI) study from Forrester Consulting. The study found that a composite organization comprised of real-world Duo customers realized a net present value (NPV) of $3.23 million over three years and a return on investment (ROI) of 159%. But Duo’s benefits extend beyond financial gains. Forrester’s study concluded that implementing Duo led to time savings for end users, help desk staff, security analysts, and IT staff, while reducing the risk of credentials-related security. For a complete look at Duo's value to a business, get the key financial data points in The TEI of Cisco Duo study.

View Now

Securing Organizations Against Identity-Based Threats

In our free eBook, Attack Vectors Decoded: Securing Organizations Against Identity-based Threats, we take you inside the criminal playbook and give you the tools to build powerful, secure identity access that protects your business, your data, and your workers -- wherever they are.

View Now

Access Management Buyer’s Guide

The modern workforce is rapidly becoming more mobile and hyperconnected, and attackers are taking note. Exploiting multiplying devices and login-fatigued employees has become a valuable currency for threat actors, so organizations need a strong access management solution in place to ensure that only trusted users and devices have access to their networks, applications, and data. But with attackers constantly innovating and finding new ways to bypass weaker multifactor authentication (MFA) implementations, how can you authorize users and devices without putting the network at risk? Or secure resources and applications without hindering productivity? Read our buyer’s guide for answers and learn what to look for when choosing the best access management solution in today’s ever-changing world.

View Now

Saving Time, Saving Money: Duo’s Passwordless and SSO Updates

In this webinar, you will learn:

  • Why SSO and passwordless authentication benefits every organization, from small business to enterprise
  • How you can set up Duo SSO and passwordless authentication in less than one hour
  • New Duo SSO features, including support for multiple identity providers (ADs) and self-service password reset
  • Details on the official launch of passwordless authentication support, including initial and upcoming integrations

View Now