7. The Role of Asymmetric Cryptography and Secure Enclaves

Logo
Presented by

Jasson Casey, CEO of Beyond Identity

About this talk

Asymmetric cryptography can be deployed to stop a private key from being removed from any device, which can stop the key from being exploited in the file system or in memory. Using secure enclaves, part of the system on a chip (SOC) from all the major semiconductor chip vendors, including Intel, Apple, AMD, AWS, ARM and more, to store and control the private keys offers a major architectural advantage in modern multi-factor authentication. Join Beyond Identity CEO, Jasson Casey in episode 6 of his Zero Trust Authentication Master Class. Follow Beyond Identity: twitter.com/beyondidentity linkedin.com/company/beyond-identity-inc Website: beyondidentity.com
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (27)
Subscribers (935)
Zero Trust Authentication protecting your workforce, customers, and developers with passwordless, phishing-resistant MFA! www.beyondidentity.com