SlideShare a Scribd company logo
HOW TO TAKE CLOUD ACCESS
CONTROL TO THE NEXT LEVEL
The Security Impact of Adding Multi Factor Authentication to Your Cloud Apps
S P E A K E R S
T O N Y C H O N
Solutions Engineer
@onelogin
S A M E R B A R O U D I
Sr. Manager, Product Marketing
@onelogin
/ / / Overview of MFA
/ / / Why MFA is Important to Data Security
/ / / How to Setup MFA in OneLogin
/ / / The MFA User Experience
A G E N D A
A P P E X P L O S I O N
I N F O R M A T I O N A C C E S S
C O N V E N I E N T
A C C E S S
S E C U R I T Y
C O N T R O L S
W H O A R E T H E Y R E A L L Y ?
?
E M P L O Y E E S - P A R T N E R S - C U S T O M E R S
D I G I T A L I D E N T I T Y
L I N K E A C H U S E R T O A T R U ST F A C T O R
P O S S E S S I O N
W H A T I S A N A U T H E N T I C A T I O N F A C T O R ?
K N O W L E D G E I N H E R E N C E
Something Known to
Only the User
Something Held by Only
the User (Token)
Something Inherent to Only
the User (Biometric Trait)
A password
a passphrase
a pin
An OTP Token
A Smartcard with x.509 public key
infrastructure credentials
A biological or behavioral trait such
as fingerprint, voice or retina
P A S S I N G T O K E N S
W H Y I S M F A I M P O R T A N T ?
****PASSWORD123***
O N E L O G I N M O B I L E A P P & O T P
“I love OneLogin because it allows me
to enforce two-factor authentication
on pretty much any application.”
M A T T T H O R N E
IT Manager, Pinterest
S M S
B U I L T I N S E C U R I T Y Q U E S T I O N S
O N E L O G I N P L A Y S W E L L W I T H O T H E R S
P R E - I N T E G R A T E D M F A
17
Product Demo
Q & A
THANK YOU
S A M E R B A R O U D I
Sr. Manager, Product Marketing
T O N Y C H A N
Solutions Engineer

More Related Content

PDF
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
PDF
How to Automate User Provisioning
PPTX
Reduce Friction and Risk with Device Authentication
PDF
Mobile Security at the World Cup
PDF
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
PPTX
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
PPTX
Network software gotovaya
PDF
Implementing Secure Access & Mobile Identity
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
How to Automate User Provisioning
Reduce Friction and Risk with Device Authentication
Mobile Security at the World Cup
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Network software gotovaya
Implementing Secure Access & Mobile Identity

What's hot (15)

PDF
ADGS Computer Systems
PDF
Easy Solutions Product Brochure
PPTX
Why Two-Factor Isn't Enough
PDF
Toward distributed and virtualized enterprise security
PDF
Removable Disk Hacking for Fun and Profit
PDF
Gunadarma workshop security
PDF
Identity Live Sydney: Intelligent Authentication
PDF
5 Mobile App Security MUST-DOs in 2018
PPTX
How to Stop Cyber Attacks Using Adaptive Authentication
PPTX
Ed McCabe - Putting the Intelligence back in Threat Intelligence
PDF
OWASP Mobile Security: Top 10 Risks for 2017
PPTX
Connect & Inspire Cyber Security
PPTX
Jerod Brennen - What You Need to Know About OSINT
PPTX
Easy security presentation 1
PPTX
Two Factor Authentication
ADGS Computer Systems
Easy Solutions Product Brochure
Why Two-Factor Isn't Enough
Toward distributed and virtualized enterprise security
Removable Disk Hacking for Fun and Profit
Gunadarma workshop security
Identity Live Sydney: Intelligent Authentication
5 Mobile App Security MUST-DOs in 2018
How to Stop Cyber Attacks Using Adaptive Authentication
Ed McCabe - Putting the Intelligence back in Threat Intelligence
OWASP Mobile Security: Top 10 Risks for 2017
Connect & Inspire Cyber Security
Jerod Brennen - What You Need to Know About OSINT
Easy security presentation 1
Two Factor Authentication
Ad

Viewers also liked (11)

PDF
Is mobile access to cloud apps putting your company at risk?
PPTX
Dia del idioma
PPTX
Dia del idioma
PPTX
Dia del idioma
PPTX
El dia del idioma
PPTX
DIA DEL IDIOMA 2010
PPTX
Dia del idioma
PDF
Celebraciòn dìa del idioma
PPTX
Identity Access Management 101
DOCX
Trovas de la literatura
DOCX
Trovas dedicadas a todos los niños
Is mobile access to cloud apps putting your company at risk?
Dia del idioma
Dia del idioma
Dia del idioma
El dia del idioma
DIA DEL IDIOMA 2010
Dia del idioma
Celebraciòn dìa del idioma
Identity Access Management 101
Trovas de la literatura
Trovas dedicadas a todos los niños
Ad

Similar to How to Take Cloud Access Control to the Next Level (20)

PDF
Compliance in the Era of Cloud
PDF
Nuno Job - what's next for software - ANDdigital tech summit
PDF
New Era of Software with modern Application Security (v0.6)
PDF
Semantic BDD with ShouldIT?
PPTX
SEE Gemeentedag: Petra de West, Roeland van Oers en Gökhan Tuna - Van selfser...
PDF
Offline-first: Making your app resilient to network failures
PDF
BS portfolio
PDF
Auto, Maschine, Buch
PDF
An introduction to Digital Marketing
PDF
PPTX
eHarmony @ Phoenix Con 2016
PPTX
Managing Technical Debt - WordCamp Orlando 2017
PDF
College Recruiter BootCamp Mountain View, CA
PDF
#Productivity - {S:01 Ep:03}
PDF
The Changing Face of Government IT
PDF
Decoupled APIs through Microservices
PDF
The net is dark and full of terrors - James Bennett
PDF
Blockchain. The silent revolution.
PDF
Meteor WWNRW Intro
PDF
Decoupled APIs through microservices
Compliance in the Era of Cloud
Nuno Job - what's next for software - ANDdigital tech summit
New Era of Software with modern Application Security (v0.6)
Semantic BDD with ShouldIT?
SEE Gemeentedag: Petra de West, Roeland van Oers en Gökhan Tuna - Van selfser...
Offline-first: Making your app resilient to network failures
BS portfolio
Auto, Maschine, Buch
An introduction to Digital Marketing
eHarmony @ Phoenix Con 2016
Managing Technical Debt - WordCamp Orlando 2017
College Recruiter BootCamp Mountain View, CA
#Productivity - {S:01 Ep:03}
The Changing Face of Government IT
Decoupled APIs through Microservices
The net is dark and full of terrors - James Bennett
Blockchain. The silent revolution.
Meteor WWNRW Intro
Decoupled APIs through microservices

More from OneLogin (11)

PPTX
Stop Hackers with Integrated CASB & IDaaS Security
PPTX
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
PPTX
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
PPTX
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
PPTX
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
PPTX
Integrated Cloud Security
PDF
Making your Cloud Initiatives Successful
PPTX
The Future of Enterprise Identity Management
PDF
Security and Convenience Without Compromise
PDF
Cloud Identity and Extending Active Directory Off-Premises
PDF
Fast Track Your Office 365 Deployments with OneLogin
Stop Hackers with Integrated CASB & IDaaS Security
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Integrated Cloud Security
Making your Cloud Initiatives Successful
The Future of Enterprise Identity Management
Security and Convenience Without Compromise
Cloud Identity and Extending Active Directory Off-Premises
Fast Track Your Office 365 Deployments with OneLogin

Recently uploaded (6)

DOC
Camb毕业证学历认证,格罗斯泰斯特主教大学毕业证仿冒文凭毕业证
PPTX
ASMS Telecommunication company Profile
DOC
证书学历UoA毕业证,澳大利亚中汇学院毕业证国外大学毕业证
PDF
Lesson 13- HEREDITY _ pedSAWEREGFVCXZDSASEWFigree.pdf
PPTX
Introduction to Packet Tracer Course Overview - Aug 21 (1).pptx
PDF
6-UseCfgfhgfhgfhgfhgfhfhhaseActivity.pdf
Camb毕业证学历认证,格罗斯泰斯特主教大学毕业证仿冒文凭毕业证
ASMS Telecommunication company Profile
证书学历UoA毕业证,澳大利亚中汇学院毕业证国外大学毕业证
Lesson 13- HEREDITY _ pedSAWEREGFVCXZDSASEWFigree.pdf
Introduction to Packet Tracer Course Overview - Aug 21 (1).pptx
6-UseCfgfhgfhgfhgfhgfhfhhaseActivity.pdf

How to Take Cloud Access Control to the Next Level

  • 1. HOW TO TAKE CLOUD ACCESS CONTROL TO THE NEXT LEVEL The Security Impact of Adding Multi Factor Authentication to Your Cloud Apps
  • 2. S P E A K E R S T O N Y C H O N Solutions Engineer @onelogin S A M E R B A R O U D I Sr. Manager, Product Marketing @onelogin
  • 3. / / / Overview of MFA / / / Why MFA is Important to Data Security / / / How to Setup MFA in OneLogin / / / The MFA User Experience A G E N D A
  • 4. A P P E X P L O S I O N I N F O R M A T I O N A C C E S S
  • 5. C O N V E N I E N T A C C E S S S E C U R I T Y C O N T R O L S
  • 6. W H O A R E T H E Y R E A L L Y ? ?
  • 7. E M P L O Y E E S - P A R T N E R S - C U S T O M E R S D I G I T A L I D E N T I T Y L I N K E A C H U S E R T O A T R U ST F A C T O R
  • 8. P O S S E S S I O N W H A T I S A N A U T H E N T I C A T I O N F A C T O R ? K N O W L E D G E I N H E R E N C E Something Known to Only the User Something Held by Only the User (Token) Something Inherent to Only the User (Biometric Trait) A password a passphrase a pin An OTP Token A Smartcard with x.509 public key infrastructure credentials A biological or behavioral trait such as fingerprint, voice or retina
  • 9. P A S S I N G T O K E N S
  • 10. W H Y I S M F A I M P O R T A N T ? ****PASSWORD123***
  • 11. O N E L O G I N M O B I L E A P P & O T P
  • 12. “I love OneLogin because it allows me to enforce two-factor authentication on pretty much any application.” M A T T T H O R N E IT Manager, Pinterest
  • 13. S M S
  • 14. B U I L T I N S E C U R I T Y Q U E S T I O N S
  • 15. O N E L O G I N P L A Y S W E L L W I T H O T H E R S
  • 16. P R E - I N T E G R A T E D M F A
  • 18. Q & A
  • 19. THANK YOU S A M E R B A R O U D I Sr. Manager, Product Marketing T O N Y C H A N Solutions Engineer