Imago Techmedia Ltd is registered in England and Wales under Company No. 04865455. VAT No. GB 843 8456 01
Registered Office: Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Business Address: Imago Techmedia, 2C Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Imago Techmedia Sweden, Nod, Borgarfjordsgatan 12, Kista, Stockholm, Sweden
Imago Techmedia is a subsidiary of Clarion Events Limited
Duo Security is a cloud-based Trusted Access provider protecting thousands of the world’s largest and fastest-growing companies and organizations, including University of York, Etsy, Facebook, K-Swiss, Paramount Pictures, Random House, Toyota, Twitter, Yelp, Zillow and more. Duo’s innovative and easy-to-use technology can be quickly deployed to protect users, data and applications from breaches, credential theft and account takeover. The Ann Arbor, Michigan-based company also has offices in San Mateo, California; Austin, Texas and London. Duo is backed by Benchmark, Google Ventures, Radar Partners, Redpoint Ventures and True Ventures. Try it for free at https://duo.com.
Duo Security Seminars
Beyond The Hype; How Attackers Win Wed 20th Sep 13:30 - 14:00
Beyond The Hype; How Attackers Win
Movies, TV and even some non-fictional press leads most to believe that a cyber attack is a complicated endeavor conducted by teams of highly skilled people. The reality is, that most successful attacks are not complicated in the least. This presentation will highlight real world attacks, why the attackers were successful and how they could have been stopped. Some new open source tools to battle phishing will be covered as well as a strategy to deal with disappearing network perimeter.
Time / Place
Wed 20th Sep 13:30 to 14:00
Cyber Threat Protection Theatre
Duo Security and King.com
A4-print-KingPressRelease-Final1.docx.pdf 137.79 kB
Facebook Case Study : How the Social Media Giant Secured Their Engineers and Protected More Than 10,000 Users
“Facebook is very fast-paced and we needed technologies that would allow us to maintain that pace. Because of the ease of use of Duo Security authentication technologies, we have seen minimal support and overhead costs.”
facebook.pdf 647.90 kB
Two-Factor Authentication Evaluation Guide
In this guide, you'll get: -A comprehensive set of criteria to customise your evaluation to your organisation’s needs -An overview of the hidden costs of a two-factor solution and how to determine your return on investment (ROI) -And more
Two-Factor Authentication Evaluation Guide (2).pdf 3.55 MB
The Trouble With Phishing
Phishing is one of the most common threats hitting organisations. This guide details the problems around phishing, how it works, and how Duo can be leveraged as a solution.
the-trouble-with-phishing-guide (1).pdf 438.74 kB
The 2017 Duo Trusted Access Report - The Current State of Enterprise Endpoint Security
The enterprise perimeter has been redefined by new networking models – and with new tech, come new security risks.
duo-trusted-access-report-2017 (2).pdf 2.02 MB
Moving Beyond the Perimeter_ Part 1
The Theory Behind Google’s BeyondCorp Security Model
Moving Beyond the Perimeter_ Part 1.pdf 324.00 kB
Moving Beyond the Perimeter_ Part 2
How To Implement The BeyondCorp Security Model
moving-beyond-the-perimeter-part-2.pdf 302.61 kB