Two-Factor and Multifactor Authentication Strategies

Two-Factor and Multifactor Authentication Strategies News

View All News

Two-Factor and Multifactor Authentication Strategies Get Started

Bring yourself up to speed with our introductory content

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are. Continue Reading

  • Kerberos

    Kerberos is the authentication protocol used by most operating systems. Each time a Windows client logs into a corporate network, Kerberos is being used to authenticate access. Continue Reading

  • single sign-on (SSO)

    Single sign-on is a session and user authentication process in which a user can access multiple applications with one name and password. Continue Reading

View All Get Started

Evaluate Two-Factor and Multifactor Authentication Strategies Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Two-Factor and Multifactor Authentication Strategies

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Two-Factor and Multifactor Authentication Strategies Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close