Welcome! Ready To Secure Access to Your Microsoft Applications?
During the Webinar Audio In presentation mode until end Control Panel View webinar in full screen mode Feel Free to submit written questions Open Q & A at the end (Raise your Hand & we will Unmute your Line!) Survey at Conclusion of Webinar & in Email!
We Hope You are Enjoying Your Pizza!! If it hasn t arrived by 12:15 Please double check with your receptionist then contact Tracey Maranto (contact info is in chat also!) EMAIL: tmaranto@syssrc.com CALL or TEXT: 443-865-6446 Sorry your Pizza isn t THIS big! (Brenda s Deep Creek Lake!) (we are recording the webinar so don t think twice about stepping away for a few minutes to go pick it up at your front desk!)
Trusted Access A new model for security Vinh Pham MSP Partner Manager
About Duo Vinh Pham Partner Manager msp@duo.com Cybersecurity company based in Ann Arbor, Michigan Founded in 2010 ~600 employees Philosophy: Security is most effective when it s easy to use Specialize in cloud-based 2-factor authentication
Duo by the Numbers 11,000+ Customers Thousands of Apps Supported Customers in 78 Countries Analyzing 8M+ Endpoints 200M+ Monthly Authentications 98% of Customers Would Recommend Duo 100+ Technology Partners Valuation > $1B 6
What is Two Factor Authentication?
Answer: Something you know Something you have
We already use 2FA in our consumer lives
Duo Survey Results: 28% adoption rate
Why hasn t 2FA been more widely adopted?
Cybersecurity has an image problem.
Security is complicated.
Security is hard.
A typical security product deployment..
Inaction is easier than taking action
Why MFA now?
Let s start with a real story - DNC Breach March 19, 2016-26 phishing emails sent From: no-reply@accounts.googlemail.com Posing as Google notifying him that his password had been compromised Provided a bit.ly link to change the password Podesta forwarded the email to his IT team who verified the email as legitimate
Attackers are targeting users and devices 81% 75% Breaches involving compromised credentials Breaches involved compromised devices Source: 2017 Verizon Data Breach Report
Old Perimeter Corporate Network Endpoints Users Apps Servers
Cloud and BYOD are Transforming IT
New Perimeter Remote Employees Cloud Applications Hybrid Cloud Old Perimeter Traditional Network: Endpoints, On-site Users, Servers, Apps Mobile Devices Personal Devices Vendors & Contractors
Broader attack surface. Higher risk of a breach. It all starts with credentials.
The password isn t enough
1 2-factor authentication is an absolute necessity for any form of remote access.
World s Simplest and Most Secure MFA One tap authentication No codes to enter Absurdly quick to deploy and enroll users
Duo Push Demo
2017 Verizon Data Breach Report 81% 75% Breaches involving compromised credentials Breaches involved compromised devices Source: 2017 Verizon Data Breach Report
Device Insight
Trusted Access Vision Trusted Users Who is the user? What s their role? Privileged User? 2FA Trusted Devices Every Application Up to date? Securely configured? Corporate Issued or BYOD? Device Insight Cloud and On-Premise Apps Single Sign On Consistent End User Experience Policies Verify the identity of users and the health of their devices before they access your applications
2017 Verizon Data Breach Report 81% 75% Breaches involving compromised credentials Breaches involved compromised devices Source: 2017 Verizon Data Breach Report
MFA for Applications Within Minutes Microsoft VPNs Cloud Apps On-Premises Identity Custom REST APIS WEB SDK RADIUS unix RRAS SAML OIDC Integration documents are available at duo.com/docs
MFA for Applications Within Minutes Microsoft VPNs Cloud Apps On-Premises Identity Custom REST APIS WEB SDK RADIUS unix RRAS SAML OIDC Integration documents are available at duo.com/docs
Duo and Microsoft Duo has partnered with Microsoft to help protect all of your applications with the same easy, flexible and consistent end user experience Duo + Office 365 Duo + Azure AD Azure Active Directory (Cloud) Active Directory (On-premises)
Let s Recap...
The perimeter ain t what it used to be.
Cloud and BYOD are Transforming IT
As a result, users and their devices will always be targeted
In conclusion.. Verifying your users identity and the health of their devices will help you secure your applications, no matter where they reside
Security Made Easy and Effective Thank you 43
Live Q & A Raise your hand and we will open your phone line Please Take Our Brief Survey at Conclusion of the Webinar! THANKS FOR SPENDING YOUR LUNCH WITH US