Identity security checklist 2020

  • January 30 at 2 PM AEDT | 2 PM GMT | 2 PM EST
  • 45 Mins

Presented by

JayIAM expert

About this webinar

You may have already implemented network and perimeter security solutions to secure your organization from cyberattacks, but that can only go so far in ensuring foolproof security. According to a 2019 report[1], 80 percent of hacking-related breaches were due to weak, compromised credentials. The report further notes that 29 percent of all breaches were due to compromised credentials. The global average cost of a data breach is nearly $4 million[2]. Therefore, securing identities and implementing tighter access controls should be at the center of your security program. 

In this webinar, our identity and access management (IAM) expert Jay will explain how to:

  • Automate the entire user account life cycle, from provisioning to deprovisioning and account cleanup.
  • Prevent privileged account compromise with just-in-time and just-enough access.
  • Enable secure one-click access to enterprise applications through multi-factor authentication (MFA) protected single sign-on (SSO).
  • Set up role-based access controls and granular permissions for tighter security.
  • Create and enforce custom password policies through a centralized password management platform.
  • Get audit trails detailing the four Ws (who, when, what, where) of user activities and resource access.

[1] Verizon's 2019 Data Breach Investigations Report

[2] 2019 Cost of a Data Breach Report, Ponemon Institute

Watch Now

  • Please enter your name Please enter your email Please enter valid email address
  • By clicking 'Play now', you agree to processing of personal data according to the Privacy Policy.

© 2020 Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now