FCW | The Business of Federal Technology
The Business of Federal Technology
  • People
  • IT Modernization
  • Digital Government
  • Security
  • Acquisition
  • Congress
  • IT Leadership
  • Events
  • Resources
  • About
    • Contact
    • Advertise
    • Reprints
    • List Rental

Webcasts

The End of Authentication As We Know It – What’s Next?

With CAC cards being phased out and password authentication proving to be a security liability, new rules and guidelines are moving agencies to identity based authentication methods including multi-factor authentication, contextual authentication and behavioral based identity assurance.

This webinar discusses these changes by:

  • Reviewing existing threat landscape
  • Defining the requirements for new authentication solution
  • Proposing solutions that:
    • Addresses current and future security threats
    • Delivers cutting edge authentication methods to satisfy mandates
    • Avoids disruption of operations during deployment
    • Secures all applications and systems
    • Leverages existing IT infrastructure and skills

Sponsored By Crossmatch

Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.


FCW | The Business of Federal Technology
  • About Us
  • Contact Us
  • Subscribe
  • Digital Edition
  • Advertise
  • Reprints
  • List Rental
  • ©2018 1105 Media, Inc.
  • View our Privacy Policy and Terms of Service
  • 1105 Media