New & Notable
Looking for something else?
Two-Factor and Multifactor Authentication Strategies News
July 08, 2014
Following the collapse of an AWS-based cloud hosting provider, experts say enterprises should prioritize use of multifactor authentication.
April 30, 2013
McAfee introduces two new identity and access management (IAM) products.
April 23, 2013
The 2013 Verizon data breach report details how authentication attacks affect organizations of all sizes, blaming single-factor passwords.
October 05, 2012
Microsoft has purchased the multifactor factor authentication platform vendor for an undisclosed amount.
Two-Factor and Multifactor Authentication Strategies Get Started
Bring yourself up to speed with our introductory content
A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.... Continue Reading
FIDO (Fast ID Online) is an open standard for a secure and easy-to-use universal authentication interface created to address the lack of interoperability among strong authentication devices. The FIDO standard supports multifactor authentication and... Continue Reading
Multifactor authentication (MFA) is a security system that requires more than one form of authentication to verify the legitimacy of a transaction. MFA combines two or more independent credentials: what the user knows (password), what the user has (... Continue Reading
Evaluate Two-Factor and Multifactor Authentication Strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google's recent acquisition of two-factor authentication vendor StickLogin could push it ahead in the secure identity management industry. Continue Reading
Will open FIDO standards for better interoperability of next-generation authentication technologies actually work? Continue Reading
The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed in April. As industry players such as Google, Microsoft and RSA work on stronger authentication ... Continue Reading
Manage Two-Factor and Multifactor Authentication Strategies
Learn to apply best practices and optimize your operations.
Video: SANS Institute's John Pescatore says though new evasion techniques are aiding advanced targeted attacks, defense matters as much as response. Continue Reading
Enterprise authentication practices are plagued with problems. IAM expert Michele Chubirka examines whether the FIDO Alliance can offer solutions. Continue Reading
Expert Dave Shackleford discusses authentication in the cloud, including details on the multifactor authentication services of major cloud providers. Continue Reading
Problem Solve Two-Factor and Multifactor Authentication Strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
FIDO-ready tech could take a while, but there are a variety of multifactor authentication methods available now to make your logins secure. Continue Reading
Enterprise use of adaptive authentication is growing internally and for Web applications. Brad Causey details the allure of risk-based authentication. Continue Reading
Two-factor authentication vulnerabilities are a real concern, but should they deter enterprises from deploying 2FA? Expert Michael Cobb discusses. Continue Reading