Welcome! []...Let’s start with a real story - DNC Breach March 19, 2016 - 26 phishing emails sent...
Transcript of Welcome! []...Let’s start with a real story - DNC Breach March 19, 2016 - 26 phishing emails sent...
-
Ready To Secure Access to Your Microsoft Applications?
Welcome!
-
During the Webinar…
● Audio – In presentation mode until end● Control Panel
● View webinar in full screen mode● Feel Free to submit written questions ● Open Q & A at the end
(Raise your Hand & we will Unmute your Line!)● Survey at Conclusion of Webinar & in Email!
-
If it hasn’t arrived by 12:15Please double check with your receptionist
then contact Tracey Maranto(contact info is in chat also!)
EMAIL: [email protected] CALL or TEXT: 443-865-6446
(we are recording the webinar – so don’t think twice about stepping away
for a few minutes to go pick it up at your front desk!)
We Hope You are Enjoying Your Pizza!!
Sorry your Pizza isn’t THIS big! ☹ (Brenda’s – Deep Creek Lake!)
-
Trusted Access A new model for security
Vinh PhamMSP Partner Manager
-
About Duo
Vinh PhamPartner [email protected]
● Cybersecurity company based in Ann Arbor, Michigan
● Founded in 2010
● ~600 employees
● Philosophy: Security is most effective when it’s easy to use
● Specialize in cloud-based 2-factor authentication
-
Duo by the Numbers
6
200M+ Monthly Authentications
98% of Customers Would Recommend Duo
11,000+ Customers
Thousands of Apps Supported
Analyzing 8M+ Endpoints
Valuation > $1B
Customers in 78 Countries
100+Technology Partners
-
What is Two Factor Authentication?
-
Answer:
Something you know
Something you have
-
We already use 2FA in our consumer lives
-
Duo Survey Results:
28% adoption rate
-
Why hasn’t 2FA been more widely adopted?
-
Cybersecurity has an image problem.
-
Security is complicated.
-
Security is hard.
-
A typical security product deployment..
-
Inaction is easier than taking action
-
Why MFA now?
-
Let’s start with a real story - DNC Breach ● March 19, 2016 - 26 phishing emails
sent
● From: [email protected]
● Posing as Google notifying him that his password had been compromised
● Provided a bit.ly link to change the password
● Podesta forwarded the email to his IT team who verified the email as legitimate
-
Attackers are targeting users and devices
81%Breaches involving compromised credentials
75%Breaches involved compromised devices
Source: 2017 Verizon Data Breach Report
-
Corporate Network
Old Perimeter
Endpoints Users Apps Servers
-
Cloud and BYOD are Transforming IT
-
New Perimeter
Old PerimeterCloud Applications
Hybrid Cloud
Personal Devices
Vendors & Contractors
Mobile Devices
Remote Employees
Traditional Network:Endpoints, On-site Users,
Servers, Apps
-
Broader attack surface.
Higher risk of a breach.
It all starts with credentials.
-
The password isn’t enough
-
12-factor authentication is an absolute necessity for any form of remote access.
-
World’s Simplest and Most Secure MFA
● One tap authentication● No codes to enter● Absurdly quick to deploy and
enroll users
-
Duo Push Demo
-
2017 Verizon Data Breach Report
81%Breaches involving compromised credentials
75%Breaches involved compromised devices
Source: 2017 Verizon Data Breach Report
✔
-
Device Insight
-
Trusted Access Vision
● Who is the user?● What’s their role?● Privileged User?
● Up to date? ● Securely configured?● Corporate Issued or
BYOD?
● Cloud and On-Premise Apps
● Single Sign On● Consistent End User
Experience
Trusted Users
Trusted Devices
Every Application
Verify the identity of users and the health of their devices before they access your applications
2FA Device Insight Policies
-
2017 Verizon Data Breach Report
81%Breaches involving compromised credentials
75%Breaches involved compromised devices
Source: 2017 Verizon Data Breach Report
✔ ✔
-
unix
Microsoft
RRAS
VPNs Cloud Apps On-Premises CustomIdentity
REST APIS
WEB SDK
RADIUS
SAML
OIDC
MFA for Applications Within Minutes
Integration documents are available at duo.com/docs
-
unix
Microsoft
RRAS
VPNs Cloud Apps On-Premises CustomIdentity
REST APIS
WEB SDK
RADIUS
SAML
OIDC
MFA for Applications Within Minutes
Integration documents are available at duo.com/docs
-
Duo and Microsoft
Duo + Office 365 Duo + Azure AD
Active Directory
(On-premises)
Duo has partnered with Microsoft to help protect all of your applications with the same easy, flexible and consistent end user experience
Azure Active Directory (Cloud)
-
Let’s Recap...
-
The perimeter ain’t what it used to be.
-
Cloud and BYOD are Transforming IT
-
As a result, users and their devices will always be targeted
-
In conclusion..
Verifying your users’ identity and the health of their devices will help you secure your applications, no matter where they reside
-
Security Made Easy and Effective
43
Thank you
-
Live Q & ARaise your hand and
we will open your phone line
Please Take Our Brief Survey at Conclusion of the Webinar!
THANKS FOR SPENDING YOUR LUNCH WITH US