Two-Factor and Multifactor Authentication Strategies News
April 24, 2015
The U.S. government wants to solve the weaknesses in online ID proofing systems, but it needs the help of enterprise and security professionals in order to overcome privacy concerns and other issues.
March 10, 2015
The mobile payment app maker responds to criticism by stepping up security with better verifications and notifications for email and phone number changes.
January 09, 2015
Expert contributor David Strom provides the lowdown on CA's Strong Authentication multifactor authentication software solution.
September 17, 2014
Following a high-profile leak of celebrity photos, Apple has moved to improve its iCloud two-factor authentication mechanisms.
Two-Factor and Multifactor Authentication Strategies Get Started
Bring yourself up to speed with our introductory content
Bring Your Own Authentication (BYOA) is a computing concept in which employee-owned devices are used as authentication credentials within the enterprise. Continue Reading
FIDO (Fast ID Online) is an open standard for a secure and easy-to-use universal authentication interface created to address the lack of interoperability among strong authentication devices. Continue Reading
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code. Continue Reading
Evaluate Two-Factor and Multifactor Authentication Strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Tokens secure IT software and services by serving as additional factors. This slideshow takes a look back at the humble beginnings of MFA technology and how well security tokens now secure enterprise IT assets. Continue Reading
This Security School explores next-generation authentication technologies, standards and methods that may soon replace the personal-password system. Continue Reading
You've reviewed the webcast, tip and podcast. So: Are you ready for the way Internet authentication practices will be changing? Take this quiz and see. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
xFA can add multifactor security to any web service with a few lines of code. We tested xFA on a small network in August 2014. It has...Continue Reading
The VIP manager doesn't authenticate through AD or LDAP, but overall customer satisfaction has increased.Powered by IT Central Station
Valuable Features: Ease of integration End user acceptance • Improvements to My Organization: After the initial integration, the overall...Continue Reading
Deployment is very fast, but delivering the address labels of where tokens are to be sent should be delivered by emailPowered by IT Central Station
Valuable Features: The self service token deployment combined with administrative rolls gives you a lot of flexibility as a Managed SP. •...Continue Reading
Manage Two-Factor and Multifactor Authentication Strategies
Learn to apply best practices and optimize your operations.
The right security policies and technology can make or break an enterprise's identity and access management process. Learn why AWS IAM is crucial when protecting corporate data. Continue Reading
Stay apprised of FIDO developments in authentication technology standards, and share the the joy of FIDO authentication and freedom from passwords. Continue Reading
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands. Continue Reading
Problem Solve Two-Factor and Multifactor Authentication Strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
FIDO-ready tech could take a while, but there are a variety of multifactor authentication methods available now to make your logins secure. Continue Reading
Enterprise authentication practices are plagued with problems. IAM expert Michele Chubirka examines whether the FIDO Alliance can offer solutions. Continue Reading
Expert Dave Shackleford discusses authentication in the cloud, including details on the multifactor authentication services of major cloud providers. Continue Reading