{"id":81203,"date":"2020-10-01T09:45:08","date_gmt":"2020-10-01T01:45:08","guid":{"rendered":"https:\/\/www.i-sprint.com\/?p=81203"},"modified":"2022-03-11T09:46:01","modified_gmt":"2022-03-11T01:46:01","slug":"th-webinar-mfa-1oct20","status":"publish","type":"post","link":"https:\/\/www.i-sprint.com\/ja\/th-webinar-mfa-1oct20\/","title":{"rendered":"TH Webinar: Multi-Factor Authentication \u2013 A Critical Layer in Your Security Plan for Compliant"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><p><img decoding=\"async\" class=\"alignnone size-full wp-image-81207\" src=\"https:\/\/www.i-sprint.com\/wp-content\/uploads\/2022\/03\/for-website.png\" alt=\"\" width=\"1002\" height=\"827\" srcset=\"https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/for-website-200x165.png 200w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/for-website-300x248.png 300w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/for-website-400x330.png 400w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/for-website-600x495.png 600w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/for-website-768x634.png 768w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/for-website-800x660.png 800w, https:\/\/1217570951.rsc.cdn77.org\/wp-content\/uploads\/2022\/03\/for-website.png 1002w\" sizes=\"(max-width: 1002px) 100vw, 1002px\" loading=\"lazy\" \/><\/p>\n<\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-transform:none;\"><p><strong>Multi-Factor Authentication: A Critical Layer in Your Security Plan for Compliant<\/strong><\/p>\n<p>&#8220;Authentication is created to ensure you are who you are. Over the years, business needs are changing according to the evolvement of technology. Simple login using just username and password is not as secure as before. Companies need to enhance the security level to protect their digital assets and users. In this webinar, i-Sprint will share with you about:<\/p>\n<ul>\n<li>Trends and regulations<\/li>\n<li>Why multi-factor authentication (MFA)?<\/li>\n<li>How do you use MFA?<\/li>\n<\/ul>\n<p>Join us on Thursday, 1 October 2020 at 14:00 &#8211; 15:00 and hear from our presenters from i-Sprint Innovations as they share with you on trends and MFA.<\/p>\n<p><strong>\u0e01\u0e32\u0e23\u0e22\u0e37\u0e19\u0e22\u0e31\u0e19\u0e15\u0e31\u0e27\u0e15\u0e19\u0e41\u0e1a\u0e1a\u0e2b\u0e25\u0e32\u0e22\u0e1b\u0e31\u0e08\u0e08\u0e31\u0e22:\u0e2b\u0e31\u0e27\u0e43\u0e08\u0e2a\u0e33\u0e04\u0e31\u0e0d\u0e43\u0e19\u0e41\u0e1c\u0e19\u0e23\u0e31\u0e01\u0e29\u0e32\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e2a\u0e33\u0e2b\u0e23\u0e31\u0e1a\u0e01\u0e32\u0e23\u0e1b\u0e0e\u0e34\u0e1a\u0e31\u0e15\u0e34\u0e15\u0e32\u0e21\u0e2b\u0e25\u0e31\u0e01\u0e40\u0e01\u0e13\u0e11\u0e4c\u0e41\u0e25\u0e30\u0e02\u0e49\u0e2d\u0e01\u0e33\u0e2b\u0e19\u0e14\u0e15\u0e48\u0e32\u0e07\u0e46<\/strong><\/p>\n<p>&#8220;\u0e01\u0e32\u0e23\u0e22\u0e37\u0e19\u0e22\u0e31\u0e19\u0e15\u0e31\u0e27\u0e15\u0e19\u0e16\u0e39\u0e01\u0e2a\u0e23\u0e49\u0e32\u0e07\u0e02\u0e36\u0e49\u0e19\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e43\u0e2b\u0e49\u0e41\u0e19\u0e48\u0e43\u0e08\u0e27\u0e48\u0e32\u0e04\u0e38\u0e13\u0e40\u0e1b\u0e47\u0e19\u0e15\u0e31\u0e27\u0e04\u0e38\u0e13\u0e40\u0e2d\u0e07\u0e08\u0e23\u0e34\u0e07\u0e46<\/p>\n<p>\u0e43\u0e19\u0e0a\u0e48\u0e27\u0e07\u0e2b\u0e25\u0e32\u0e22\u0e1b\u0e35\u0e17\u0e35\u0e48\u0e1c\u0e48\u0e32\u0e19\u0e21\u0e32\u0e04\u0e27\u0e32\u0e21\u0e15\u0e49\u0e2d\u0e07\u0e01\u0e32\u0e23\u0e17\u0e32\u0e07\u0e18\u0e38\u0e23\u0e01\u0e34\u0e08\u0e40\u0e1b\u0e25\u0e35\u0e48\u0e22\u0e19\u0e41\u0e1b\u0e25\u0e07\u0e44\u0e1b\u0e15\u0e32\u0e21\u0e01\u0e32\u0e23\u0e1e\u0e31\u0e12\u0e19\u0e32\u0e02\u0e2d\u0e07\u0e40\u0e17\u0e04\u0e42\u0e19\u0e42\u0e25\u0e22\u0e35 \u0e01\u0e32\u0e23\u0e40\u0e02\u0e49\u0e32\u0e2a\u0e39\u0e48\u0e23\u0e30\u0e1a\u0e1a\u0e41\u0e1a\u0e1a\u0e40\u0e14\u0e34\u0e21\u0e46 \u0e42\u0e14\u0e22\u0e43\u0e0a\u0e49\u0e41\u0e04\u0e48\u0e0a\u0e37\u0e48\u0e2d\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e41\u0e25\u0e30\u0e23\u0e2b\u0e31\u0e2a\u0e1c\u0e48\u0e32\u0e19\u0e19\u0e31\u0e49\u0e19<\/p>\n<p>\u0e44\u0e21\u0e48\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e40\u0e2b\u0e21\u0e37\u0e2d\u0e19\u0e40\u0e21\u0e37\u0e48\u0e2d\u0e01\u0e48\u0e2d\u0e19\u0e2d\u0e35\u0e01\u0e15\u0e48\u0e2d\u0e44\u0e1b \u0e1a\u0e23\u0e34\u0e29\u0e31\u0e17\u0e15\u0e48\u0e32\u0e07\u0e46 \u0e08\u0e33\u0e40\u0e1b\u0e47\u0e19\u0e15\u0e49\u0e2d\u0e07\u0e40\u0e1e\u0e34\u0e48\u0e21\u0e23\u0e30\u0e14\u0e31\u0e1a\u0e04\u0e27\u0e32\u0e21\u0e1b\u0e25\u0e2d\u0e14\u0e20\u0e31\u0e22\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e1b\u0e49\u0e2d\u0e07\u0e01\u0e31\u0e19\u0e17\u0e23\u0e31\u0e1e\u0e22\u0e4c\u0e2a\u0e34\u0e19\u0e17\u0e32\u0e07\u0e14\u0e34\u0e08\u0e34\u0e17\u0e31\u0e25\u0e41\u0e25\u0e30\u0e1c\u0e39\u0e49\u0e43\u0e0a\u0e49\u0e07\u0e32\u0e19 \u0e43\u0e19\u0e01\u0e32\u0e23\u0e2a\u0e31\u0e21\u0e21\u0e19\u0e32\u0e1c\u0e48\u0e32\u0e19\u0e40\u0e27\u0e47\u0e1a\u0e19\u0e35\u0e49 i-Sprint \u0e08\u0e30\u0e41\u0e1a\u0e48\u0e07\u0e1b\u0e31\u0e19\u0e01\u0e31\u0e1a\u0e04\u0e38\u0e13\u0e43\u0e19\u0e2b\u0e31\u0e27\u0e02\u0e49\u0e2d\u0e14\u0e31\u0e07\u0e15\u0e48\u0e2d\u0e44\u0e1b\u0e19\u0e35\u0e49:<\/p>\n<ul>\n<li>\u0e41\u0e19\u0e27\u0e42\u0e19\u0e49\u0e21\u0e41\u0e25\u0e30\u0e02\u0e49\u0e2d\u0e04\u0e27\u0e23\u0e1b\u0e0f\u0e34\u0e1a\u0e31\u0e15\u0e34<\/li>\n<li>\u0e17\u0e33\u0e44\u0e21\u0e16\u0e36\u0e07\u0e15\u0e49\u0e2d\u0e07\u0e43\u0e0a\u0e49\u0e01\u0e32\u0e23\u0e22\u0e37\u0e19\u0e22\u0e31\u0e19\u0e15\u0e31\u0e27\u0e15\u0e19\u0e41\u0e1a\u0e1a\u0e2b\u0e25\u0e32\u0e22\u0e1b\u0e31\u0e08\u0e08\u0e31\u0e22?<\/li>\n<li>\u0e27\u0e34\u0e18\u0e35\u0e01\u0e32\u0e23\u0e43\u0e0a\u0e49\u0e01\u0e32\u0e23\u0e22\u0e37\u0e19\u0e22\u0e31\u0e19\u0e15\u0e31\u0e27\u0e15\u0e19\u0e41\u0e1a\u0e1a\u0e2b\u0e25\u0e32\u0e22\u0e1b\u0e31\u0e08\u0e08\u0e31\u0e22\u0e43\u0e19\u0e23\u0e39\u0e1b\u0e41\u0e1a\u0e1a\u0e15\u0e48\u0e32\u0e07\u0e46<\/li>\n<\/ul>\n<p>\u0e40\u0e02\u0e49\u0e32\u0e23\u0e48\u0e27\u0e21\u0e01\u0e31\u0e1a\u0e40\u0e23\u0e32\u0e43\u0e19\u0e27\u0e31\u0e19\u0e1e\u0e24\u0e2b\u0e31\u0e2a\u0e17\u0e35\u0e48 1 \u0e15\u0e38\u0e25\u0e32\u0e04\u0e21 2020 \u0e40\u0e27\u0e25\u0e32 14:00 &#8211; 15:00 \u0e19. \u0e41\u0e25\u0e30\u0e23\u0e31\u0e1a\u0e1f\u0e31\u0e07\u0e04\u0e27\u0e32\u0e21\u0e04\u0e34\u0e14\u0e40\u0e2b\u0e47\u0e19\u0e08\u0e32\u0e01\u0e27\u0e34\u0e17\u0e22\u0e32\u0e01\u0e23\u0e02\u0e2d\u0e07 i-Sprint Innovations \u0e1e\u0e27\u0e01\u0e40\u0e23\u0e32\u0e08\u0e30\u0e41\u0e1a\u0e48\u0e07\u0e1b\u0e31\u0e19\u0e40\u0e01\u0e35\u0e48\u0e22\u0e27\u0e01\u0e31\u0e1a\u0e41\u0e19\u0e27\u0e42\u0e19\u0e49\u0e21\u0e41\u0e25\u0e30\u0e01\u0e32\u0e23\u0e22\u0e37\u0e19\u0e22\u0e31\u0e19\u0e15\u0e31\u0e27\u0e15\u0e19\u0e41\u0e1a\u0e1a\u0e2b\u0e25\u0e32\u0e22\u0e1b\u0e31\u0e08\u0e08\u0e31\u0e22<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-double\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;border-bottom-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Companies need to enhance the security level to protect their digital assets and users. In this webinar, i-Sprint will share with you about Trends and regulations, Why multi-factor authentication (MFA), and How do you use MFA.<\/p>\n","protected":false},"author":141,"featured_media":81215,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","footnotes":""},"categories":[169],"tags":[],"class_list":["post-81203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-ja"],"_links":{"self":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/comments?post=81203"}],"version-history":[{"count":2,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81203\/revisions"}],"predecessor-version":[{"id":81213,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/posts\/81203\/revisions\/81213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media\/81215"}],"wp:attachment":[{"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/media?parent=81203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/categories?post=81203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i-sprint.com\/ja\/wp-json\/wp\/v2\/tags?post=81203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}