Cloud Computing Management

Enforcing Modern Authentication Factors for Office 365

Provided by Okta

Category Cloud Computing Management

Type Webcast

Length

Publish Date December 16 2016

Date posted December 16 2016

Overview

Customers that are migrating to Office 365 or onboarding other cloud apps have complex requirements, particularly when it comes to the security of the service. Over the last 20 years, cyber security has evolved and now dominates the headlines. More than ever before, users are accessing their messaging and productivity tools from untrusted networks, devices and workstations and providing multi-factor and analytics has never been more critical.

In this webcast, Okta explain how to take complex identity management requirements and make them manageable. They discuss how instead of relying on legacy tools, you can remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy.

This webcast shows how you can:

  • Configure SSO for Office 365 in minutes
  • Enforce modern authentication factors for Office 365
  • Easily manage user provisioning on one pane of glass

Recommended for You

silhouette

Which Enterprise Password Managers work the best?

IDG Connect tackles the tech stories that matter to you

kathryn-cave

The IoT “time bomb” report: 49 security experts share their views

Kathryn Cave looks at the big trends in global tech

phil-muncaster

China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?