Analysis: How FIDO Alliance might change authentication

Two-Factor and Multifactor Authentication Strategies

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Best of authentication 2013

    Readers vote for the top authentication products in 2013: Digital identity verification products, services and management systems. 

  • Best Authentication Products 2011

    Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards. 

  • Exploring authentication methods: How to develop secure systems

    Use this guide to discover authentication options and learn how to implement, maintain and secure several methods of authentication, such as biometrics, single sign-on (SSO) and smart cards to avoid security breaches and protect sensitive corporate a... 

  • Quiz: The new school of enterprise authentication

    Take this five-question quiz to test your knowledge of Mark Diodati's enterprise authentication lesson. 

  • The New School of Enterprise Authentication

    Burton Group's Mark Diodati examines the technologies that cutting-edge organizations use to redefine successful enterprise authentication. 

  • Future authentication technologies: How to choose the right product

    In this lesson in's Identity and Access Management Security School, Burton Group's Mark Diodati explores innovative and cost-effective user-based authentication technologies. 

  • Quiz: Next-generation authentication

    A five-question multiple-choice quiz to test your understanding of the content presented by expert Mark Diodati in this lesson of's Identity and Access Management Security School. 

  • Authentication quiz

    Take this quiz to see how much you've learned in the Authentication lesson of Identity and Access Management Security School. 

  • Identity and access management final exam

    Find out how much you learned in Identity and Access Management Security School and the areas where you need to focus more attention. 

  • Secure user authentication: Regulations, implementation and methods

    When deploying any authentication option -- whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls -- businesses need to weigh several factors to decide which option best suits their needs. In this l...