On-Demand Webinar
On-Demand Webinar
On-Demand Webinar

Tech Talks: Multi-Factor Authentication Best Practices

60 mins
Section Background TextureSection Background Texture

Join product experts from Absolute Security for a 60-minute session featuring a demo of Multi-Factor Authentication (MFA) configuration for Absolute Secure Access. By requiring an additional verification step, MFA helps combat cyber threats and is a standard requirement for many compliance regulations including HIPAA, PCI-DSS, CAF and ENISA.

You’ll learn:

  • Best practices for configuring MFA on the Secure Access server.  
  • How to configure Secure Access with your identity provider including a demo of the client authentication sequence when configuring Entra and Duo.
  • How MFA for Secure Access console authentication works.

Don’t miss out on this opportunity to hear from Absolute’s product leaders during this 60-minute session including a Q&A portion at the end.

You can also explore our collection of customer digital event recordings to help you get the most out of Absolute Security.

Register for the webinar
Thank you!
Start Watching

Join product experts from Absolute Security for a 60-minute session featuring a demo of Multi-Factor Authentication (MFA) configuration for Absolute Secure Access. By requiring an additional verification step, MFA helps combat cyber threats and is a standard requirement for many compliance regulations including HIPAA, PCI-DSS, CAF and ENISA.

You’ll learn:

  • Best practices for configuring MFA on the Secure Access server.  
  • How to configure Secure Access with your identity provider including a demo of the client authentication sequence when configuring Entra and Duo.
  • How MFA for Secure Access console authentication works.

Don’t miss out on this opportunity to hear from Absolute’s product leaders during this 60-minute session including a Q&A portion at the end.

You can also explore our collection of customer digital event recordings to help you get the most out of Absolute Security.

Agenda
2 mins
Intro & Housekeeping
25 mins
Presentation & Demo
30 mins
Q&A
3 mins
Resources & Conclusion

Featured Speakers

No items found.

Tech Talks FAQ

Absolute Secure Access packages are offered in three flavors: Absolute Core™, Absolute Edge ™, and Absolute Enterprise with the included products and capabilities as outlined below. Regional variations might be available.

  • Absolute Core
    • Secure, optimized tunnel
    • ZTNA dynamic policy enforcement
    • Network Access Control (NAC)
  • Absolute Edge
    • Includes Absolute Core, and adds:
    • AI-powered web protection (“Shadow IT”)
    • Absolute Insights for Network (70+ dashboards)
    • AI Threat Insights
  • Absolute Enterprise
    • Includes Absolute Edge, and adds:
    • Multiple AV scans
    • Data Loss Prevention (DLP)
    • Remote Browser Isolation (RBI)
    • Content Disarm and Reconstruction (CDR)
    • Endpoint Compliance

For Absolute Edge customers, Absolute offers the Absolute Secure Web Gateway Service (powered by Ericom) add-on module that tightly integrates with the extensive policy capabilities in Absolute Secure Access. It strengthens an organization’s security posture while improving end user experience.

Absolute Enterprise converges Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Private Access (ZTNA), Data Loss Prevention (DLP) and Remote Browser Isolation (RBI) into a single platform. Absolute Enterprise provides real-time data and threat protection against advanced zero-day and cloud-enabled threats and offers Endpoint Compliance that enables additional visibility, control, and resilience on devices.