Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Ready To Secure Access to Your Microsoft Applications?
Welcome!
During the Webinar…
● Audio – In presentation mode until end● Control Panel
● View webinar in full screen mode● Feel Free to submit written questions ● Open Q & A at the end
(Raise your Hand & we will Unmute your Line!)● Survey at Conclusion of Webinar & in Email!
If it hasn’t arrived by 12:15Please double check with your receptionist
then contact Tracey Maranto(contact info is in chat also!)
EMAIL: [email protected] CALL or TEXT: 443-865-6446
(we are recording the webinar – so don’t think twice about stepping away
for a few minutes to go pick it up at your front desk!)
We Hope You are Enjoying Your Pizza!!
Sorry your Pizza isn’t THIS big! ☹ (Brenda’s – Deep Creek Lake!)
Trusted Access A new model for security
Vinh PhamMSP Partner Manager
About Duo
Vinh PhamPartner [email protected]
● Cybersecurity company based in Ann Arbor, Michigan
● Founded in 2010
● ~600 employees
● Philosophy: Security is most effective when it’s easy to use
● Specialize in cloud-based 2-factor authentication
Duo by the Numbers
6
200M+ Monthly Authentications
98% of Customers Would Recommend Duo
11,000+ Customers
Thousands of Apps Supported
Analyzing 8M+ Endpoints
Valuation > $1B
Customers in 78 Countries
100+Technology Partners
What is Two Factor Authentication?
Answer:
Something you know
Something you have
We already use 2FA in our consumer lives
Duo Survey Results:
28% adoption rate
Why hasn’t 2FA been more widely adopted?
Cybersecurity has an image problem.
Security is complicated.
Security is hard.
A typical security product deployment..
Inaction is easier than taking action
Why MFA now?
Let’s start with a real story - DNC Breach ● March 19, 2016 - 26 phishing emails
sent
● From: [email protected]
● Posing as Google notifying him that his password had been compromised
● Provided a bit.ly link to change the password
● Podesta forwarded the email to his IT team who verified the email as legitimate
Attackers are targeting users and devices
81%Breaches involving compromised credentials
75%Breaches involved compromised devices
Source: 2017 Verizon Data Breach Report
Corporate Network
Old Perimeter
Endpoints Users Apps Servers
Cloud and BYOD are Transforming IT
New Perimeter
Old PerimeterCloud Applications
Hybrid Cloud
Personal Devices
Vendors & Contractors
Mobile Devices
Remote Employees
Traditional Network:Endpoints, On-site Users,
Servers, Apps
Broader attack surface.
Higher risk of a breach.
It all starts with credentials.
The password isn’t enough
12-factor authentication is an absolute necessity for any form of remote access.
World’s Simplest and Most Secure MFA
● One tap authentication● No codes to enter● Absurdly quick to deploy and
enroll users
Duo Push Demo
2017 Verizon Data Breach Report
81%Breaches involving compromised credentials
75%Breaches involved compromised devices
Source: 2017 Verizon Data Breach Report
✔
Device Insight
Trusted Access Vision
● Who is the user?● What’s their role?● Privileged User?
● Up to date? ● Securely configured?● Corporate Issued or
BYOD?
● Cloud and On-Premise Apps
● Single Sign On● Consistent End User
Experience
Trusted Users
Trusted Devices
Every Application
Verify the identity of users and the health of their devices before they access your applications
2FA Device Insight Policies
2017 Verizon Data Breach Report
81%Breaches involving compromised credentials
75%Breaches involved compromised devices
Source: 2017 Verizon Data Breach Report
✔ ✔
unix
Microsoft
RRAS
VPNs Cloud Apps On-Premises CustomIdentity
REST APIS
WEB SDK
RADIUS
SAML
OIDC
MFA for Applications Within Minutes
Integration documents are available at duo.com/docs
unix
Microsoft
RRAS
VPNs Cloud Apps On-Premises CustomIdentity
REST APIS
WEB SDK
RADIUS
SAML
OIDC
MFA for Applications Within Minutes
Integration documents are available at duo.com/docs
Duo and Microsoft
Duo + Office 365 Duo + Azure AD
Active Directory
(On-premises)
Duo has partnered with Microsoft to help protect all of your applications with the same easy, flexible and consistent end user experience
Azure Active Directory (Cloud)
Let’s Recap...
The perimeter ain’t what it used to be.
Cloud and BYOD are Transforming IT
As a result, users and their devices will always be targeted
In conclusion..
Verifying your users’ identity and the health of their devices will help you secure your applications, no matter where they reside
Security Made Easy and Effective
43
Thank you
Live Q & ARaise your hand and
we will open your phone line
Please Take Our Brief Survey at Conclusion of the Webinar!
THANKS FOR SPENDING YOUR LUNCH WITH US