twitter linkedin facebook.png

Authorization and authentication protocols - view our webinar recording right now!

About this webinar recording

In the cloud-hybrid world, organizations typically use many systems, with many different authentication protocols – and not all protocols are equally secure and easy to manage.

The authorization and authentication protocols we choose are our main line of defence in a highly connected environment. And, with new protocols constantly emerging, it is a continual arms race.

Technical decision makers are regularly confronted with policy and operational questions about authentication protocols that they find difficult to answer. For example:

- Are we using the best protocols across our cloud and on-premise systems?
- Which so-called “legacy protocols” are old and reliable, and which are old and insecure?
- How do we know if/when we should change them?
- How should we approach their replacement?
In this webinar James Cowling, CTO of Oxford Computer Group Worldwide, presents an overview of these topics to help decision-makers gain a clear understanding of what they need to know in order to develop policy, or to specify approaches to authentication in different cloud and on-premise systems.

Who is this webinar suitable for?

This webinar is suitable for technical architects, decision makers (both architectural and development), and anyone with responsibility for security analysis and policymaking.

View the webinar today!