IT Knowledge Center From data centers and cloud computing to recovery services and security, find helpful IT whitepapers, webinars, and more.

Protect the Reality of “Anywhere”: Identity & Access Management Best Practices

Webinar Preview Image


Matt Tabor, Director of Product Management

September 29, 2019 60 minutes

Watch Recorded Webinar

Today’s mobile workforce accesses data from a variety of devices and cloud applications, opening the door for cybercriminals to use compromised identities to damage your organization. IT security teams must now face the reality of being able to protect users and devices anywhere. Shifting focus from traditional security boundaries, the rapid adoption of cloud applications and BYOD has made identity the new perimeter. Solutions like Microsoft’s Office 365 with Enterprise Mobility + Security offer an expansive portfolio of security services to centralize and manage access and identities. Join us for a discussion focused on the core tools and best practices to help protect your users and your business, including how to: - Protect access to devices and applications with Azure Active Directory - Manage company-owned and bring your own (BYO) devices with Intune - Provide extra security with multi-factor authentication - Gain visibility into your cloud apps and services with Cloud Application Security The session will be led by Matt Tabor, Director of Product Management at TierPoint. Matt has 20 years of experience working with cloud and managed services organizations in various management, consulting, and engineering roles. He currently provides strategic direction around TierPoint’s Managed Services and Cloud Platform including a managed security offering for Office 365 using Enterprise Mobility and Security services from Microsoft.

Need Help?

Didn‘t find what you were looking for? Try these options.