SlideShare a Scribd company logo
SecureAuth:*
What’s*New*to*Start*2017?
Jeff*Hickman*|*Solution*Engineer
Damon*Tepe*|*Director,*Product*Marketing*
February,*2017
SecureAuth*IdP Enhancements*AtMAMGlance
Q3
2016
Q4
2016
Q1
2017
IdP(9.0.1 IdP(9.0.2
RADIUS(2.2 SymbolEtoEAccept
• Connected(Security(
Alliance(Integrations
• RBAC
• Phone(Number(Fraud(
Prevention
• Improved(Device(
Recognition
• MFA(choice(persistence
SecureAuth*IdP 9.0.1
What’s(New(
In(Release(9.0.1?
Connected(Security(Alliance(
Integrations
Privileged*Account*Security
Identity*Governance
User*Entity*Behavior*Analytics*
(UEBA)
RoleEBased(Access(Control((RBAC)
+ Industry’s#first#focused#Alliance#
+ Eliminate#the#whitespace
+ Vendors#work#together
+ All#solutions#integrated
+ Reference#architecture#
+ GOAL:#Protect. Detect. Remediate.
Connect*Security*Alliance*Approach
Benefits(of(a(Holistic(Approach:
Truly(Integrated(Framework
Actionable(Intelligence
Foundation(of(Identity
Better(Together
Connected*Security*– Closing*The*Gaps
Exabeam#correlates#events#from#
a#variety#of#sources#to#determine#
risk#around#user#behavior
SecureAuth#provides#Exabeam#with#
rich#data#regarding#user#activity
Exabeam#provides#SecureAuth#
with#organization#specific#risk#
around#abnormal#user#behavior SecureAuth#protects#access#to#CyberArk#
privileged#account#management#functions
SailPoint correlates#events#from#a#
variety#of#sources#to#determine#risk#
around#user#access#to#critical#systems
Learn(More(@#www.secureauth.com/connectedMsecurity
+ Role#Based#Access#Control#(RBAC)
+ Often#a#requirement#for#larger#IT#teams
+ Allows#IdP#to#provide#different#
administrative#teams/roles,#different#
administrative#access
ADDITIONAL#FEATURE
IdP 9.0.1
RADIUS*2.2
Adaptive(
Authentication
+ Leverages*radius*attributes*passed*from*VPN*
devices*to*perform*preMauthentication*risk*
checks.
+ Cisco,*Citrix*NetScaler,*Pulse*Secure,*and*Palo*
Alto*all*pass*IP*Addresses*of*the*connecting*
user.
+ Provides*the*following*Adaptive*
Authentication*features:
+ Group*Filtering
+ Country/IP*Filtering
+ GeoMVelocity
+ IP*Reputation/Threat*
! Adaptive(Authentication
! Vendor(Specific(Attributes
! Customizable(Verbiage
! NetMotionSupport
Radius#Server
Vendor(Specific(
Attributes
+ Allows*extensions*to*the*standard*RFC*
defined*RADIUS*attributes.
+ Enables*unique*features*to*the*RADIUS*
platform,*such*as*displaying*preMlogon*
messages,*group*restrictions,*among*others
! Adaptive(Authentication
! Vendor(Specific(Attributes
! Customizable(Verbiage
! NetMotionSupport
Radius#Server
Customizable(Verbiage
+ Customize*the*text*that*is*shown*to*the*end*
user*on*the*RADIUS*client*device*(such*as*a*
VPN).
+ Brand,*inform,*and*educate*end*users*with*
custom*messages.
! Adaptive(Authentication
! Vendor(Specific(Attributes
! Customizable(Verbiage
! NetMotionSupport
RADIUS
NetMotion Support
+ Supports*NetMotion’s unique*Mobile*VPN*
solution.
+ Widely*used*in*Law*Enforcement,*Public*
Utilities,*and*anyone*with*a*large*mobile*
work*force*who*always*need*to*be*
connected.*
! Adaptive(Authentication
! Vendor(Specific(Attributes
! Customizable(Verbiage
! NetMotionSupport
RADIUS
SecureAuth*IdP*9.0.2
What’s(New(
In(Release(9.0.2?
Phone(Number(Fraud(Prevention
Ported*Status*blocking
Carrier*Network*blocking
Class*of*phone*blocking
OTP*Spam*Prevention
Noteworthy(Enhancements
Improved*Device*Recognition*
scoring*logic
2nd factor*persistence
PHONE(
NUMBER(
FRAUD(
PREVENTION
OTP(Spam(
Prevention
Block(by(Carrier(
Network
Block(Recently(
Ported(Numbers
Block(by(Number(
Class• Secure#PhoneMbased#
Authentication#&#Comply#with#
NIST#standards
• A(component(of(SecureAuth
Adaptive(Authentication
Regulate#number#of#OTPs#
allowed
Block#by#global#carrier#
networks
Number#been#ported#
without#consent?
Block#by#phone#number#
class
Block(Recently(Ported(
Phone(Numbers
+ Attackers*will*port*a*legitimate*phone*
number,*from*a*legitimate*user,*to*a*new*
device
+ Attacker*will*then*use*newly*ported*phone*
number*in*an*authentication*process
+ SecureAuth detects*if*a*phone*number*has*
recently*been*ported
+ SecureAuth prevents*authentication*using*
that*number*until*the*porting*has*been*
verified*by*the*end*user
! Ported(Number(blocking
! Carrier(Network(blocking
! Number(Class(blocking
! Prevent(OTP(spamming
Block(By Carrier(
Network
+All*numbers*are*associated*with*a*
carrier*network
+There*are*hundreds*of*carrier*
networks*globally*(e.g.*Verizon,*
AT&T)
+SecureAuth detects*what*carrier*a*
specific*number*is*associated*with
+SecureAuth allows*customers*to*
block*particular*carrier*networks*by*
network*or*by*country
! Ported(Number(blocking
! Carrier(Network(blocking
! Number(Class(blocking
! Prevent(OTP(spamming
Block(By Phone(
Number(Class
+All*numbers*are*associated*with*a*
class*of*phone*(e.g.*Virtual,*Mobile,*
Landline)
+SecureAuth detects*what*class*a*
specific*number*is
+SecureAuth allows*customers*to*
block*particular*phone*class(s)*from*
use*during*authentication
! Ported(Number(blocking
! Carrier(Network(blocking
! Number(Class(blocking
! Prevent(OTP(spamming
OTP(Spam(Prevention
+Attackers*will*attempt*to*brute*force*
the*authentication*process
+SecureAuth allows*admins*to*
regulate*number*of*OTPs*allowed
+Provides*a*layer*of*protection*while*
not*spamming*the*user*with*10’s*or*
100’s*of*OTPs!
! Ported(Number(blocking
! Carrier(Network(blocking
! Number(Class(blocking
! Prevent(OTP(spamming
More(9.0.2(
Noteworthy(
Enhancements(
IMPROVED*DEVICE*
RECOGNITION*SCORING*LOGIC
More*accurate*Device,
Recognition,*adapting*to*
changes*in*browser*technology*
SECOND*FACTOR*PERSISTENCE*
Better*end*user*experience*
SymbolMtoMAccept
+ Push#to#Accept#is#a#commonly#used#authentication#method
+ Organizations#and#users#like#it#because#it’s#quick#and#easy
+ Typical#Push%to%Acceptworkflow:
Review*– Push4to4Accept
CLOUD
ONEPREM
Commercial#&
Homegrown#Resources
+ Resources
Very#Susceptible#to#phishing….#
- Users#“Just#Press#Accept”#when#prompted
Here’s#how#it#works…
- Attacker#obtains#UN/PW#
- Attacker#browses#to#a#web#resource#(e.g.#VPN)#&#
begins#login#process
- 2FA/MFA#authentication#system#sends#a#notification#
to#legitimate#user
- Legitimate#user#“robotically”#presses#“Accept”
- Attacker#gains#access#with#only#UN/PW
The*Problem*with*Push4to4Accept
https://youtu.be/vcA6dLl5Sa4?t=30m38s
SYMBOLETOEACCEPT
GOAL:#Prevent'User'from''
“Just'Pressing'Accept”
+ Present#user#with#image#M match#that#
image#on#the#mobile#app
+ User#must#match#what#they#see#on#their#
computer#to#“approve”#the#transaction
+ Human#perspective;#very#effective#
because#the#user#must#know#what#to#pick#
+ Very#unlikely#user#would#guess#if#received#
an#unsolicited#push#notification
Cloud*Access
SecureAuth(
Cloud Access
+ A*path*toward*cloud*(Hybrid)
+ User*convenience*/*credential*
reduction
+ One*of*largest*support*app*libraries*
with*8000+
+ Has*both*Adaptive*and*MultiMfactor*
authentication
+ Easy*to*deploy*and*administer
www.secureauth.com/cloudEaccess
START%YOUR%FREE%TRIAL
THANK%YOU
Copyright*SecureAuth Corporation*2017
The#intellectual#content#within#this#document#is#the#property#of#SecureAuth
and#must#not#be#shared#without#prior#consent.

More Related Content

What's hot

Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
NetworkCollaborators
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
Priyanka Aash
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
Priyanka Aash
 
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)
Priyanka Aash
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
Priyanka Aash
 

What's hot (7)

Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
 
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
 

Viewers also liked

Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
SecureAuth
 
Taller de quimica organica segundo nivel 2017
Taller de quimica organica segundo nivel 2017Taller de quimica organica segundo nivel 2017
Taller de quimica organica segundo nivel 2017
sandro javier espin espin
 
Clustered data ontap_8.3_physical_storage
Clustered data ontap_8.3_physical_storageClustered data ontap_8.3_physical_storage
Clustered data ontap_8.3_physical_storage
Mohan Sati
 
คำสั่งควบคุมโปรแกรม
คำสั่งควบคุมโปรแกรม คำสั่งควบคุมโปรแกรม
คำสั่งควบคุมโปรแกรม
BoOm mm
 
Prezentare marta sms bucuresti 2017
Prezentare marta  sms bucuresti 2017Prezentare marta  sms bucuresti 2017
Prezentare marta sms bucuresti 2017
RevistaBiz
 
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Amazon Web Services
 
Finance in Dorset 2017 - Start Up Session
Finance in Dorset 2017 - Start Up Session Finance in Dorset 2017 - Start Up Session
Finance in Dorset 2017 - Start Up Session
PKF Francis Clark
 
Unit 3 - Egyptian art and architecture
Unit 3 - Egyptian art and architectureUnit 3 - Egyptian art and architecture
Unit 3 - Egyptian art and architecture
JaimeAlonsoEdu
 
Lumière sur... le métier de conseiller communication ministériel
Lumière sur... le métier de conseiller communication ministérielLumière sur... le métier de conseiller communication ministériel
Lumière sur... le métier de conseiller communication ministériel
Damien ARNAUD
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
SecureAuth
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
SecureAuth
 
Lab thesis
Lab thesis Lab thesis
Lab thesis
Imran Nur Manik
 
Química orgánica SHT
Química orgánica SHTQuímica orgánica SHT
Química orgánica SHT
sandro javier espin espin
 
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
Amazon Web Services
 
Question 7
Question 7Question 7
Question 7
Chris Wotton
 
Mapa mental cooperativas
Mapa mental cooperativasMapa mental cooperativas
Mapa mental cooperativas
Ronny Ocanto
 

Viewers also liked (18)

Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Taller de quimica organica segundo nivel 2017
Taller de quimica organica segundo nivel 2017Taller de quimica organica segundo nivel 2017
Taller de quimica organica segundo nivel 2017
 
Clustered data ontap_8.3_physical_storage
Clustered data ontap_8.3_physical_storageClustered data ontap_8.3_physical_storage
Clustered data ontap_8.3_physical_storage
 
คำสั่งควบคุมโปรแกรม
คำสั่งควบคุมโปรแกรม คำสั่งควบคุมโปรแกรม
คำสั่งควบคุมโปรแกรม
 
Prezentare marta sms bucuresti 2017
Prezentare marta  sms bucuresti 2017Prezentare marta  sms bucuresti 2017
Prezentare marta sms bucuresti 2017
 
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
 
Finance in Dorset 2017 - Start Up Session
Finance in Dorset 2017 - Start Up Session Finance in Dorset 2017 - Start Up Session
Finance in Dorset 2017 - Start Up Session
 
Unit 3 - Egyptian art and architecture
Unit 3 - Egyptian art and architectureUnit 3 - Egyptian art and architecture
Unit 3 - Egyptian art and architecture
 
Lumière sur... le métier de conseiller communication ministériel
Lumière sur... le métier de conseiller communication ministérielLumière sur... le métier de conseiller communication ministériel
Lumière sur... le métier de conseiller communication ministériel
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
Lab thesis
Lab thesis Lab thesis
Lab thesis
 
Química orgánica SHT
Química orgánica SHTQuímica orgánica SHT
Química orgánica SHT
 
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
 
Question 7
Question 7Question 7
Question 7
 
Mapa mental cooperativas
Mapa mental cooperativasMapa mental cooperativas
Mapa mental cooperativas
 

Similar to What's New in SecureAuth IdP in 2017

What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
SecureAuth
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
Deborah Schalm
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
DevOps.com
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
CSA Argentina
 
Droidstat-X, Android Applications Security Analyser Xmind Generator
Droidstat-X, Android Applications Security Analyser Xmind GeneratorDroidstat-X, Android Applications Security Analyser Xmind Generator
Droidstat-X, Android Applications Security Analyser Xmind Generator
Cláudio André
 
Live Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applicationsLive Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applications
SnapLogic
 
MindMeister and SaaS
MindMeister and SaaSMindMeister and SaaS
MindMeister and SaaS
Thomas N. Burg
 
How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?
Bijal (Bee) Hayes-Thakore
 
南部智慧醫療專班結業式_執行長談話
南部智慧醫療專班結業式_執行長談話南部智慧醫療專班結業式_執行長談話
南部智慧醫療專班結業式_執行長談話
AI.academy
 
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
Mobile Trends
 
Solving Enteprise Mobility Considerations with Telerik Mobile Platform
Solving Enteprise Mobility Considerations with Telerik Mobile PlatformSolving Enteprise Mobility Considerations with Telerik Mobile Platform
Solving Enteprise Mobility Considerations with Telerik Mobile Platform
Lohith Goudagere Nagaraj
 
C++ Webinar "Why Should You Learn C++ in 2021-22?"
C++ Webinar "Why Should You Learn C++ in 2021-22?"C++ Webinar "Why Should You Learn C++ in 2021-22?"
C++ Webinar "Why Should You Learn C++ in 2021-22?"
GlobalLogic Ukraine
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
Arthur528009
 
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Einat Shimoni
 
Tales from an Enterprise DevOps transformation
Tales from an Enterprise DevOps transformationTales from an Enterprise DevOps transformation
Tales from an Enterprise DevOps transformation
Lee Eason
 
SplunkLive! Hamburg / München Beginner Session
SplunkLive! Hamburg / München Beginner SessionSplunkLive! Hamburg / München Beginner Session
SplunkLive! Hamburg / München Beginner SessionGeorg Knon
 
TST - CATIA V5 Time Saving Toolbar
 TST - CATIA V5 Time Saving Toolbar TST - CATIA V5 Time Saving Toolbar
TST - CATIA V5 Time Saving Toolbar
Fernando Petre
 
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Rien van den Bosch
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Gerardo Pardo-Castellote
 
IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017
IDC Italy
 

Similar to What's New in SecureAuth IdP in 2017 (20)

What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps ProgramTake Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program Take Control: Design a Complete DevSecOps Program
Take Control: Design a Complete DevSecOps Program
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Droidstat-X, Android Applications Security Analyser Xmind Generator
Droidstat-X, Android Applications Security Analyser Xmind GeneratorDroidstat-X, Android Applications Security Analyser Xmind Generator
Droidstat-X, Android Applications Security Analyser Xmind Generator
 
Live Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applicationsLive Demo: Accelerate the integration of workday applications
Live Demo: Accelerate the integration of workday applications
 
MindMeister and SaaS
MindMeister and SaaSMindMeister and SaaS
MindMeister and SaaS
 
How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?
 
南部智慧醫療專班結業式_執行長談話
南部智慧醫療專班結業式_執行長談話南部智慧醫療專班結業式_執行長談話
南部智慧醫療專班結業式_執行長談話
 
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
#MTC2019: Nie tylko smartfon: nowe przykłady użycia dla Androida - Nadia Ait ...
 
Solving Enteprise Mobility Considerations with Telerik Mobile Platform
Solving Enteprise Mobility Considerations with Telerik Mobile PlatformSolving Enteprise Mobility Considerations with Telerik Mobile Platform
Solving Enteprise Mobility Considerations with Telerik Mobile Platform
 
C++ Webinar "Why Should You Learn C++ in 2021-22?"
C++ Webinar "Why Should You Learn C++ in 2021-22?"C++ Webinar "Why Should You Learn C++ in 2021-22?"
C++ Webinar "Why Should You Learn C++ in 2021-22?"
 
Synopsys_site.pptx
Synopsys_site.pptxSynopsys_site.pptx
Synopsys_site.pptx
 
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
Enterprise Applications, Analytics and Knowledge Products Positionings in Isr...
 
Tales from an Enterprise DevOps transformation
Tales from an Enterprise DevOps transformationTales from an Enterprise DevOps transformation
Tales from an Enterprise DevOps transformation
 
SplunkLive! Hamburg / München Beginner Session
SplunkLive! Hamburg / München Beginner SessionSplunkLive! Hamburg / München Beginner Session
SplunkLive! Hamburg / München Beginner Session
 
TST - CATIA V5 Time Saving Toolbar
 TST - CATIA V5 Time Saving Toolbar TST - CATIA V5 Time Saving Toolbar
TST - CATIA V5 Time Saving Toolbar
 
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
Brand Commerce - We all know the shiny stuff at the front. But what magic is ...
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
 
IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017IDC Mobiz - Mobility of Everything Forum 2017
IDC Mobiz - Mobility of Everything Forum 2017
 

More from SecureAuth

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
SecureAuth
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
SecureAuth
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
SecureAuth
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
SecureAuth
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
SecureAuth
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
SecureAuth
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
SecureAuth
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
SecureAuth
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
SecureAuth
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
SecureAuth
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
SecureAuth
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
SecureAuth
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
SecureAuth
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
SecureAuth
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
SecureAuth
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
SecureAuth
 

More from SecureAuth (18)

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

What's New in SecureAuth IdP in 2017