New & Notable
Looking for something else?
Two-Factor and Multifactor Authentication Strategies News
August 13, 2014
Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.
July 08, 2014
Following the collapse of an AWS-based cloud hosting provider, experts say enterprises should prioritize use of multifactor authentication.
April 30, 2013
McAfee introduces two new identity and access management (IAM) products.
April 23, 2013
The 2013 Verizon data breach report details how authentication attacks affect organizations of all sizes, blaming single-factor passwords.
Two-Factor and Multifactor Authentication Strategies Get Started
Bring yourself up to speed with our introductory content
A transaction authentication number (TAN) is a type of single-use password used for an online banking transaction in conjunction with a standard ID and password. TANs are often in a list made by a financial institution and sent to the owner of the ... Continue Reading
Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password. Out-of-band authentication is often used in financial ... Continue Reading
A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.... Continue Reading
Evaluate Two-Factor and Multifactor Authentication Strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google's recent acquisition of two-factor authentication vendor StickLogin could push it ahead in the secure identity management industry. Continue Reading
Will open FIDO standards for better interoperability of next-generation authentication technologies actually work? Continue Reading
The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed in April. As industry players such as Google, Microsoft and RSA work on stronger authentication ... Continue Reading
Manage Two-Factor and Multifactor Authentication Strategies
Learn to apply best practices and optimize your operations.
Video: SANS Institute's John Pescatore says though new evasion techniques are aiding advanced targeted attacks, defense matters as much as response. Continue Reading
Enterprise authentication practices are plagued with problems. IAM expert Michele Chubirka examines whether the FIDO Alliance can offer solutions. Continue Reading
Expert Dave Shackleford discusses authentication in the cloud, including details on the multifactor authentication services of major cloud providers. Continue Reading
Problem Solve Two-Factor and Multifactor Authentication Strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
FIDO-ready tech could take a while, but there are a variety of multifactor authentication methods available now to make your logins secure. Continue Reading
Enterprise use of adaptive authentication is growing internally and for Web applications. Brad Causey details the allure of risk-based authentication. Continue Reading
Two-factor authentication vulnerabilities are a real concern, but should they deter enterprises from deploying 2FA? Expert Michael Cobb discusses. Continue Reading