44
Ready To Secure Access to Your Microsoft Applications? Welcome!

Welcome! []...Let’s start with a real story - DNC Breach March 19, 2016 - 26 phishing emails sent From: [email protected] Posing as Google notifying him that his password

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

  • Ready To Secure Access to Your Microsoft Applications?

    Welcome!

  • During the Webinar…

    ● Audio – In presentation mode until end● Control Panel

    ● View webinar in full screen mode● Feel Free to submit written questions ● Open Q & A at the end

    (Raise your Hand & we will Unmute your Line!)● Survey at Conclusion of Webinar & in Email!

  • If it hasn’t arrived by 12:15Please double check with your receptionist

    then contact Tracey Maranto(contact info is in chat also!)

    EMAIL: [email protected] CALL or TEXT: 443-865-6446

    (we are recording the webinar – so don’t think twice about stepping away

    for a few minutes to go pick it up at your front desk!)

    We Hope You are Enjoying Your Pizza!!

    Sorry your Pizza isn’t THIS big! ☹ (Brenda’s – Deep Creek Lake!)

  • Trusted Access A new model for security

    Vinh PhamMSP Partner Manager

  • About Duo

    Vinh PhamPartner [email protected]

    ● Cybersecurity company based in Ann Arbor, Michigan

    ● Founded in 2010

    ● ~600 employees

    ● Philosophy: Security is most effective when it’s easy to use

    ● Specialize in cloud-based 2-factor authentication

  • Duo by the Numbers

    6

    200M+ Monthly Authentications

    98% of Customers Would Recommend Duo

    11,000+ Customers

    Thousands of Apps Supported

    Analyzing 8M+ Endpoints

    Valuation > $1B

    Customers in 78 Countries

    100+Technology Partners

  • What is Two Factor Authentication?

  • Answer:

    Something you know

    Something you have

  • We already use 2FA in our consumer lives

  • Duo Survey Results:

    28% adoption rate

  • Why hasn’t 2FA been more widely adopted?

  • Cybersecurity has an image problem.

  • Security is complicated.

  • Security is hard.

  • A typical security product deployment..

  • Inaction is easier than taking action

  • Why MFA now?

  • Let’s start with a real story - DNC Breach ● March 19, 2016 - 26 phishing emails

    sent

    ● From: [email protected]

    ● Posing as Google notifying him that his password had been compromised

    ● Provided a bit.ly link to change the password

    ● Podesta forwarded the email to his IT team who verified the email as legitimate

  • Attackers are targeting users and devices

    81%Breaches involving compromised credentials

    75%Breaches involved compromised devices

    Source: 2017 Verizon Data Breach Report

  • Corporate Network

    Old Perimeter

    Endpoints Users Apps Servers

  • Cloud and BYOD are Transforming IT

  • New Perimeter

    Old PerimeterCloud Applications

    Hybrid Cloud

    Personal Devices

    Vendors & Contractors

    Mobile Devices

    Remote Employees

    Traditional Network:Endpoints, On-site Users,

    Servers, Apps

  • Broader attack surface.

    Higher risk of a breach.

    It all starts with credentials.

  • The password isn’t enough

  • 12-factor authentication is an absolute necessity for any form of remote access.

  • World’s Simplest and Most Secure MFA

    ● One tap authentication● No codes to enter● Absurdly quick to deploy and

    enroll users

  • Duo Push Demo

  • 2017 Verizon Data Breach Report

    81%Breaches involving compromised credentials

    75%Breaches involved compromised devices

    Source: 2017 Verizon Data Breach Report

  • Device Insight

  • Trusted Access Vision

    ● Who is the user?● What’s their role?● Privileged User?

    ● Up to date? ● Securely configured?● Corporate Issued or

    BYOD?

    ● Cloud and On-Premise Apps

    ● Single Sign On● Consistent End User

    Experience

    Trusted Users

    Trusted Devices

    Every Application

    Verify the identity of users and the health of their devices before they access your applications

    2FA Device Insight Policies

  • 2017 Verizon Data Breach Report

    81%Breaches involving compromised credentials

    75%Breaches involved compromised devices

    Source: 2017 Verizon Data Breach Report

    ✔ ✔

  • unix

    Microsoft

    RRAS

    VPNs Cloud Apps On-Premises CustomIdentity

    REST APIS

    WEB SDK

    RADIUS

    SAML

    OIDC

    MFA for Applications Within Minutes

    Integration documents are available at duo.com/docs

  • unix

    Microsoft

    RRAS

    VPNs Cloud Apps On-Premises CustomIdentity

    REST APIS

    WEB SDK

    RADIUS

    SAML

    OIDC

    MFA for Applications Within Minutes

    Integration documents are available at duo.com/docs

  • Duo and Microsoft

    Duo + Office 365 Duo + Azure AD

    Active Directory

    (On-premises)

    Duo has partnered with Microsoft to help protect all of your applications with the same easy, flexible and consistent end user experience

    Azure Active Directory (Cloud)

  • Let’s Recap...

  • The perimeter ain’t what it used to be.

  • Cloud and BYOD are Transforming IT

  • As a result, users and their devices will always be targeted

  • In conclusion..

    Verifying your users’ identity and the health of their devices will help you secure your applications, no matter where they reside

  • Security Made Easy and Effective

    43

    Thank you

  • Live Q & ARaise your hand and

    we will open your phone line

    Please Take Our Brief Survey at Conclusion of the Webinar!

    THANKS FOR SPENDING YOUR LUNCH WITH US