Buyer's Guide

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Multifactor authentication: A buyer's guide to MFA products

In this SearchSecurity buyer's guide, learn why you should deploy multifactor authentication technology, and how to procure and buy the right MFA products for your organization.

Introduction

Multifactor authentication (MFA) is a security technology that takes something that end users possess, such as a security token (e.g., a key fob, fingerprint, software on a smartphone), and pairs it with a standard username/password login to prove they're who they claim to be. The purpose of MFA is to toughen login credentials to prevent malicious actors from wreaking havoc by accessing a company network surreptitiously or pilfering private data.

In this buyer's guide, readers will learn about the different methods of MFA and how the technologies have evolved over the years from key fobs to smartphones and mobile devices, and how to identify the three operational scenarios for implementation when evaluating this security technology in the enterprise. It also lays out what enterprises need to know before investing and presents direct MFA product comparisons and product overviews of some of the top MFA products available today.

1What is...?-

The evolution of multifactor authentication technology

Take a look at the different multifactor authentication methods and how the technologies have evolved from key fobs to smartphones and mobile devices.

Feature

Introduction to multifactor authentication methods in the enterprise

Expert David Strom looks at multifactor authentication (MFA) methods and how the technologies have evolved from key fobs to smartphones and mobile devices. Continue Reading

2Do I need…?-

The business case for multifactor authentication

Identify which of the three operational scenarios apply to a potential multifactor authentication implementation when evaluating the business cases for the security technology in the enterprise.

Feature

Multifactor authentication examples and business case scenarios

When evaluating the business cases for multifactor authentication in the enterprise, expert David Strom says an organization must first identify which of the three operational scenarios apply to a potential implementation. Continue Reading

3How to buy…?-

Multifactor authentication procurement

Ask these questions and follow these criteria when shopping for MFA products.

Feature

Multifactor authentication purchasing considerations: What you need to know

Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA solution. Continue Reading

4Which should I buy?-

The top multifactor authentication products compared

What makes a particular multifactor authentication tool right for a particular enterprise? Here we compare several leading MFA vendors to review the pros and cons of their products to help you decide which one may be right for your organization.

Feature

Comparing the top multifactor authentication vendors

What makes a multifactor authentication tool right for an enterprise? Expert David Strom compares several of the leading multifactor authentication vendors and reviews the pros and cons of their solutions. Continue Reading

5Top product overviews-

A who's who of the market's leading multifactor authentication vendors

Multifactor authentication can be a critical component of an enterprise security strategy. Here's a look at the top MFA products in the industry.

Feature

RSA Authentication Manager offers a variety of authentication methods

With authentication methods ranging from risk-based to tokens, RSA Authentication Manager gives companies a number of ways to employ multifactor authentication. Continue Reading

Feature

Summing up Symantec VIP Service, a multifactor authentication tool

Expert David Strom looks at the Symantec VIP multifactor authentication product and how it can benefit enterprise security. Continue Reading

Feature

CA Strong Authentication offers businesses low-cost MFA and 2FA

CA Strong Authentication brings inexpensive multi- and two-factor authentication to businesses looking to protect mobile applications and devices and to prevent identity theft. Continue Reading

Feature

VASCO IDENTIKEY Authentication Server and a look at its key features

Expert David Strom takes a closer look at VASCO's IDENTIKEY Authentication Server, one of the leading multifactor authentication products on the market. Continue Reading

Feature

SecureAuth IdP: An overview of its multifactor authentication ability

Expert David Strom looks at how SecureAuth IdP uniquely combines multifactor authentication and single sign-on login capabilities in a single product. Continue Reading

Feature

Quest Defender protects businesses with two-factor authentication

Through the Defender Management Portal, Quest Defender lets users request hard and soft tokens to provide valuable two-factor authentication and monitor all token activity. Continue Reading

Feature

An in-depth look at Gemalto's SafeNet Authentication Service

Expert David Strom provides an in-depth look at Gemalto's SafeNet Authentication Service, a SaaS-based multifactor authentication product for boosting login security. Continue Reading

Feature

Okta Adaptive MFA gives companies flexible authentication

Okta Adaptive MFA offers businesses a range of flexible authentication methods that use different contexts to determine which factors provide users with access. Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close