Cisco - Tech Research Online https://techresearchonline.com/author/cisco/ Knowledge Base for IT Pros Wed, 13 Mar 2024 12:31:35 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.4 https://techresearchonline.com/wp-content/uploads/2019/09/full-black-d_favicon-70-70.png Cisco - Tech Research Online https://techresearchonline.com/author/cisco/ 32 32 Risk-Based Authentication: How Duo Can Reduce Risks for Hybrid Work https://techresearchonline.com/whitepapers/technology-whitepapers/risk-based-authentication-how-duo-can-reduce-risks-for-hybrid-work/ https://techresearchonline.com/whitepapers/technology-whitepapers/risk-based-authentication-how-duo-can-reduce-risks-for-hybrid-work/#respond Mon, 26 Feb 2024 12:28:48 +0000 https://techresearchonline.com/?p=723509 Risk-Based Authorization solves two challenges: it allows users to gain access from anywhere and ensures that access is secure. Find out how to frustrate attackers, not users with RBA in this guide. View More

The post Risk-Based Authentication: How Duo Can Reduce Risks for Hybrid Work appeared first on Tech Research Online.

]]>
Risk-Based Authorization solves two challenges: it allows users to gain access from anywhere and ensures that access is secure. Find out how to frustrate attackers, not users with RBA in this guide.

[contact-form-7]


The post Risk-Based Authentication: How Duo Can Reduce Risks for Hybrid Work appeared first on Tech Research Online.

]]>
https://techresearchonline.com/whitepapers/technology-whitepapers/risk-based-authentication-how-duo-can-reduce-risks-for-hybrid-work/feed/ 0
Duo Makes Strong Security Feel Easy https://techresearchonline.com/whitepapers/information-technology-whitepapers/duo-makes-strong-security-feel-easy/ https://techresearchonline.com/whitepapers/information-technology-whitepapers/duo-makes-strong-security-feel-easy/#respond Fri, 23 Feb 2024 14:12:45 +0000 https://techresearchonline.com/?p=723526 At a glance, discover how Cisco Duo combines robust authentication with a user-friendly experience to make strong security feel easier than ever. View More

The post Duo Makes Strong Security Feel Easy appeared first on Tech Research Online.

]]>
At a glance, discover how Cisco Duo combines robust authentication with a user-friendly experience to make strong security feel easier than ever.

[contact-form-7]


The post Duo Makes Strong Security Feel Easy appeared first on Tech Research Online.

]]>
https://techresearchonline.com/whitepapers/information-technology-whitepapers/duo-makes-strong-security-feel-easy/feed/ 0
Security Outcomes for Zero Trust: Adoption, Access, and Automation Trends https://techresearchonline.com/whitepapers/technology-whitepapers/security-outcomes-for-zero-trust-adoption-access-and-automation-trends/ https://techresearchonline.com/whitepapers/technology-whitepapers/security-outcomes-for-zero-trust-adoption-access-and-automation-trends/#respond Fri, 23 Feb 2024 13:30:28 +0000 https://techresearchonline.com/?p=723520 At Cisco, we believe the promise of a zero trust security strategy should be securing access in a way that frustrates attackers and not users. Zero trust is not a new concept. But today’s rise in adoption reflects a fast-changing reality – boundaries that once existed to secure access to corporate data no longer exist. Business leaders adopting zero trust security are making progress towards building security resilience into their organizations. Despite some confusion over how to implement zero trust principles, many enterprises have made progress with material rewards as proof. So, what are the secrets of their success? View More

The post Security Outcomes for Zero Trust: Adoption, Access, and Automation Trends appeared first on Tech Research Online.

]]>
At Cisco, we believe the promise of a zero trust security strategy should be securing access in a way that frustrates attackers and not users. Zero trust is not a new concept. But today’s rise in adoption reflects a fast-changing reality – boundaries that once existed to secure access to corporate data no longer exist. Business leaders adopting zero trust security are making progress towards building security resilience into their organizations. Despite some confusion over how to implement zero trust principles, many enterprises have made progress with material rewards as proof.

So, what are the secrets of their success?

[contact-form-7]


The post Security Outcomes for Zero Trust: Adoption, Access, and Automation Trends appeared first on Tech Research Online.

]]>
https://techresearchonline.com/whitepapers/technology-whitepapers/security-outcomes-for-zero-trust-adoption-access-and-automation-trends/feed/ 0
The State of Passwordless in the Enterprise Webinar https://techresearchonline.com/whitepapers/technology-whitepapers/the-state-of-passwordless-in-the-enterprise-webinar/ https://techresearchonline.com/whitepapers/technology-whitepapers/the-state-of-passwordless-in-the-enterprise-webinar/#respond Fri, 23 Feb 2024 12:48:58 +0000 https://techresearchonline.com/?p=723515 76% of organizations experienced multiple account or credential compromises over the past 12 months, according to ESG’s 2023 research about the state of passwordless authentication in enterprise organizations. Recent prominent MFA-based breaches and friction in the end-user experience have reached the ears of IT and cybersecurity leadership. Now, IT security professionals are looking to address these risks by evaluating phishing-resistant and passwordless authentication methods but lack clarity on the uses cases this technology fulfills. Join this engaging discussion with Cisco Duo Product Marketer Matt Brooks and ESG Senior Analyst Jack Poller as they unpack the research findings to understand the evolution of multi-factor authentication and passwordless technologies, and how IT security professionals are responding to the changing threats landscape. You will walk away from this session with a deeper understanding of: Risks and challenges of MFA and password-based authentication Pitfalls and struggles of migrating to passwordless authentication Passwordless authentication methods and best-fit use cases to adopt them View More

The post The State of Passwordless in the Enterprise Webinar appeared first on Tech Research Online.

]]>
76% of organizations experienced multiple account or credential compromises over the past 12 months, according to ESG’s 2023 research about the state of passwordless authentication in enterprise organizations. Recent prominent MFA-based breaches and friction in the end-user experience have reached the ears of IT and cybersecurity leadership. Now, IT security professionals are looking to address these risks by evaluating phishing-resistant and passwordless authentication methods but lack clarity on the uses cases this technology fulfills.

Join this engaging discussion with Cisco Duo Product Marketer Matt Brooks and ESG Senior Analyst Jack Poller as they unpack the research findings to understand the evolution of multi-factor authentication and passwordless technologies, and how IT security professionals are responding to the changing threats landscape.

You will walk away from this session with a deeper understanding of:

Risks and challenges of MFA and password-based authentication
Pitfalls and struggles of migrating to passwordless authentication
Passwordless authentication methods and best-fit use cases to adopt them

[contact-form-7]


The post The State of Passwordless in the Enterprise Webinar appeared first on Tech Research Online.

]]>
https://techresearchonline.com/whitepapers/technology-whitepapers/the-state-of-passwordless-in-the-enterprise-webinar/feed/ 0
How to Prevent Attacks that Bypass MFA Webinar https://techresearchonline.com/whitepapers/information-technology-whitepapers/how-to-prevent-attacks-that-bypass-mfa-webinar/ https://techresearchonline.com/whitepapers/information-technology-whitepapers/how-to-prevent-attacks-that-bypass-mfa-webinar/#respond Fri, 23 Feb 2024 12:24:32 +0000 https://techresearchonline.com/?p=724194 The usual first step in establishing a zero trust environment is to deploy Multi-Factor Authentication (MFA) to control access to applications and services. MFA is popular because its protections — which combine what users know (such as a password) with something they have (a token or mobile phone) — make it hard for cybercriminals to gain access to applications and data. But MFA’s widespread use of mobile authenticators and push notifications has made MFA environments themselves a target of hackers. Attackers are increasingly using MFA Fatigue (or prompt bombing) to wear down a user’s patience and diligence with repeated fake MFA prompts, only to ultimately pose as a helpful IT support person who needs the user’s credentials to clear those nuisance alerts up. And then they’re in. Fortunately, there are ways to defend against these attacks. MFA authentication is effective — but only if it’s properly protected. Knowing how to outsmart attacks designed to bypass MFA is as critical as deploying MFA itself. Watch this on-demand webinar to hear directly from an in-the-field researcher how to strengthen authentication to prevent attacks that try to bypass MFA. You’ll leave with proven best practices and new knowledge about where your MFA gaps …

The post How to Prevent Attacks that Bypass MFA Webinar appeared first on Tech Research Online.

]]>
The usual first step in establishing a zero trust environment is to deploy Multi-Factor Authentication (MFA) to control access to applications and services. MFA is popular because its protections — which combine what users know (such as a password) with something they have (a token or mobile phone) — make it hard for cybercriminals to gain access to applications and data. But MFA’s widespread use of mobile authenticators and push notifications has made MFA environments themselves a target of hackers. Attackers are increasingly using MFA Fatigue (or prompt bombing) to wear down a user’s patience and diligence with repeated fake MFA prompts, only to ultimately pose as a helpful IT support person who needs the user’s credentials to clear those nuisance alerts up. And then they’re in.

Fortunately, there are ways to defend against these attacks. MFA authentication is effective — but only if it’s properly protected. Knowing how to outsmart attacks designed to bypass MFA is as critical as deploying MFA itself. Watch this on-demand webinar to hear directly from an in-the-field researcher how to strengthen authentication to prevent attacks that try to bypass MFA. You’ll leave with proven best practices and new knowledge about where your MFA gaps may be — and how to fill them.

[contact-form-7]


The post How to Prevent Attacks that Bypass MFA Webinar appeared first on Tech Research Online.

]]>
https://techresearchonline.com/whitepapers/information-technology-whitepapers/how-to-prevent-attacks-that-bypass-mfa-webinar/feed/ 0
Two-Factor Authentication Evaluation Guide https://techresearchonline.com/whitepapers/technology-whitepapers/two-factor-authentication-evaluation-guide/ https://techresearchonline.com/whitepapers/technology-whitepapers/two-factor-authentication-evaluation-guide/#respond Fri, 23 Feb 2024 12:16:20 +0000 https://techresearchonline.com/?p=723505 In this guide, you will learn how to evaluate a solution based on: Security Impact – Does the solution reduce risks, and can it provide visibility into your environment? Strategic Business Initiatives – Does the solution support cloud, mobile and BYOD initiatives? Can it fulfill compliance? Total Cost of Ownership (TCO) – Does the solution provide more upfront value, or more hidden costs? Resources Required – Can your staff deploy and maintain the solution, or will you need to hire more personnel or contractors? View More

The post Two-Factor Authentication Evaluation Guide appeared first on Tech Research Online.

]]>
In this guide, you will learn how to evaluate a solution based on:

Security Impact – Does the solution reduce risks, and can it provide visibility into your environment?
Strategic Business Initiatives – Does the solution support cloud, mobile and BYOD initiatives? Can it fulfill compliance?
Total Cost of Ownership (TCO) – Does the solution provide more upfront value, or more hidden costs?
Resources Required – Can your staff deploy and maintain the solution, or will you need to hire more personnel or contractors?

[contact-form-7]


The post Two-Factor Authentication Evaluation Guide appeared first on Tech Research Online.

]]>
https://techresearchonline.com/whitepapers/technology-whitepapers/two-factor-authentication-evaluation-guide/feed/ 0
How to go from MFA to Zero Trust: A Five Phase Plan for Securing User and Device Access to Applications https://techresearchonline.com/whitepapers/information-technology-whitepapers/how-to-go-from-mfa-to-zero-trust-a-five-phase-plan-for-securing-user-and-device-access-to-applications/ https://techresearchonline.com/whitepapers/information-technology-whitepapers/how-to-go-from-mfa-to-zero-trust-a-five-phase-plan-for-securing-user-and-device-access-to-applications/#respond Fri, 23 Feb 2024 12:13:40 +0000 https://techresearchonline.com/?p=724172 Increased connectivity coupled with the rise of remote and hybrid work are prompting organizations to evolve their user access security and make strides towards a zero trust future. This guide offers a five-phase approach for implementing zero trust security for trusted user and device access to applications. View More

The post How to go from MFA to Zero Trust: A Five Phase Plan for Securing User and Device Access to Applications appeared first on Tech Research Online.

]]>
Increased connectivity coupled with the rise of remote and hybrid work are prompting organizations to evolve their user access security and make strides towards a zero trust future. This guide offers a five-phase approach for implementing zero trust security for trusted user and device access to applications.

[contact-form-7]


The post How to go from MFA to Zero Trust: A Five Phase Plan for Securing User and Device Access to Applications appeared first on Tech Research Online.

]]>
https://techresearchonline.com/whitepapers/information-technology-whitepapers/how-to-go-from-mfa-to-zero-trust-a-five-phase-plan-for-securing-user-and-device-access-to-applications/feed/ 0
Why Single Sign-On (SSO) Webinar? https://techresearchonline.com/whitepapers/technology-whitepapers/why-single-sign-on-sso-webinar/ https://techresearchonline.com/whitepapers/technology-whitepapers/why-single-sign-on-sso-webinar/#respond Fri, 23 Feb 2024 12:09:26 +0000 https://techresearchonline.com/?p=723501 Single Sign-On (SSO) is an important aspect of access management, which includes Multi-Factor Authentication (MFA), SSO, and user and device posture policies for today’s hybrid workforce. With Single Sign-On, end users only need a single set of credentials to log into multiple websites and applications, both cloud and on-premises. This makes life easier for users since they don’t have to remember multiple passwords and provides administrators a centralized way to manage all accounts and govern which users have access to them. View More

The post Why Single Sign-On (SSO) Webinar? appeared first on Tech Research Online.

]]>
Single Sign-On (SSO) is an important aspect of access management, which includes Multi-Factor Authentication (MFA), SSO, and user and device posture policies for today’s hybrid workforce. With Single Sign-On, end users only need a single set of credentials to log into multiple websites and applications, both cloud and on-premises. This makes life easier for users since they don’t have to remember multiple passwords and provides administrators a centralized way to manage all accounts and govern which users have access to them.

[contact-form-7]


The post Why Single Sign-On (SSO) Webinar? appeared first on Tech Research Online.

]]>
https://techresearchonline.com/whitepapers/technology-whitepapers/why-single-sign-on-sso-webinar/feed/ 0
Healthcare Shifts in Cybersecurity eBook https://techresearchonline.com/whitepapers/information-technology-whitepapers/healthcare-shifts-in-cybersecurity-ebook/ https://techresearchonline.com/whitepapers/information-technology-whitepapers/healthcare-shifts-in-cybersecurity-ebook/#respond Fri, 23 Feb 2024 11:52:17 +0000 https://techresearchonline.com/?p=724109 The healthcare industry faces some of the strictest rules and regulations, and any cyberattack on a hospital – ransomware or otherwise – becomes a literal matter of life and death. So, how can hospitals and healthcare systems, facing the challenges of a hybrid, multi-cloud world — protect private patient data and identifying information when insecure passwords open the door for cybercriminals? In our free guide, Healthcare shifts in cybersecurity, learn how multi-factor authentication (MFA), single sign-on (SSO), and other technologies not only help healthcare adopt and deliver zero trust access to the right people, but build a security posture that meets HIPAA, HITECH, and other security requirements. View More

The post Healthcare Shifts in Cybersecurity eBook appeared first on Tech Research Online.

]]>
The healthcare industry faces some of the strictest rules and regulations, and any cyberattack on a hospital – ransomware or otherwise – becomes a literal matter of life and death. So, how can hospitals and healthcare systems, facing the challenges of a hybrid, multi-cloud world — protect private patient data and identifying information when insecure passwords open the door for cybercriminals? In our free guide, Healthcare shifts in cybersecurity, learn how multi-factor authentication (MFA), single sign-on (SSO), and other technologies not only help healthcare adopt and deliver zero trust access to the right people, but build a security posture that meets HIPAA, HITECH, and other security requirements.

[contact-form-7]


The post Healthcare Shifts in Cybersecurity eBook appeared first on Tech Research Online.

]]>
https://techresearchonline.com/whitepapers/information-technology-whitepapers/healthcare-shifts-in-cybersecurity-ebook/feed/ 0
Retail Cybersecurity eBook: The Journey to Zero Trust https://techresearchonline.com/whitepapers/technology-whitepapers/retail-cybersecurity-ebook-the-journey-to-zero-trust/ https://techresearchonline.com/whitepapers/technology-whitepapers/retail-cybersecurity-ebook-the-journey-to-zero-trust/#respond Fri, 23 Feb 2024 11:50:36 +0000 https://techresearchonline.com/?p=724125 Modern MFA For Retail’s Hybrid Workforce Modern retail organizations are moving data to the cloud while still accessing on-premises applications. This makes multi-factor authentication (MFA) software an important addition to the retail sector’s security strategy. Duo’s strong endpoint security helps protect credentials and helps stop lateral movement. Our MFA works in all settings and also helps keep retail companies Payment Card Industry Data Security Standard (PCI DSS) compliant… and more! View More

The post Retail Cybersecurity eBook: The Journey to Zero Trust appeared first on Tech Research Online.

]]>
Modern MFA For Retail’s Hybrid Workforce

Modern retail organizations are moving data to the cloud while still accessing on-premises applications. This makes multi-factor authentication (MFA) software an important addition to the retail sector’s security strategy. Duo’s strong endpoint security helps protect credentials and helps stop lateral movement. Our MFA works in all settings and also helps keep retail companies Payment Card Industry Data Security Standard (PCI DSS) compliant… and more!

[contact-form-7]


The post Retail Cybersecurity eBook: The Journey to Zero Trust appeared first on Tech Research Online.

]]>
https://techresearchonline.com/whitepapers/technology-whitepapers/retail-cybersecurity-ebook-the-journey-to-zero-trust/feed/ 0