Multifactor authentication (MFA) is a security technology that takes something that end users possess, such as a security token (e.g., a key fob, fingerprint, software on a smartphone), and pairs it with a standard username/password login to prove they're who they claim to be. The purpose of MFA is to toughen login credentials to prevent malicious actors from wreaking havoc by accessing a company network surreptitiously or pilfering private data.
In this buyer's guide, readers will learn about the different methods of MFA and how the technologies have evolved over the years from key fobs to smartphones and mobile devices, and how to identify the three operational scenarios for implementation when evaluating this security technology in the enterprise. It also lays out what enterprises need to know before investing and presents direct MFA product comparisons and product overviews of some of the top MFA products available today.
The evolution of multifactor authentication technology
Take a look at the different multifactor authentication methods and how the technologies have evolved from key fobs to smartphones and mobile devices.
Expert David Strom looks at multifactor authentication (MFA) methods and how the technologies have evolved from key fobs to smartphones and mobile devices. Continue Reading
2Do I need…?-
The business case for multifactor authentication
Identify which of the three operational scenarios apply to a potential multifactor authentication implementation when evaluating the business cases for the security technology in the enterprise.
When evaluating the business cases for multifactor authentication in the enterprise, expert David Strom says an organization must first identify which of the three operational scenarios apply to a potential implementation. Continue Reading
3How to buy…?-
Multifactor authentication procurement
Ask these questions and follow these criteria when shopping for MFA products.
Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA solution. Continue Reading
4Which should I buy?-
The top multifactor authentication products compared
What makes a particular multifactor authentication tool right for a particular enterprise? Here we compare several leading MFA vendors to review the pros and cons of their products to help you decide which one may be right for your organization.
What makes a multifactor authentication tool right for an enterprise? Expert David Strom compares several of the leading multifactor authentication vendors and reviews the pros and cons of their solutions. Continue Reading
5Top product overviews-
A who's who of the market's leading multifactor authentication vendors
Multifactor authentication can be a critical component of an enterprise security strategy. Here's a look at the top MFA products in the industry.
With authentication methods ranging from risk-based to tokens, RSA Authentication Manager gives companies a number of ways to employ multifactor authentication. Continue Reading
Expert David Strom looks at the Symantec VIP multifactor authentication product and how it can benefit enterprise security. Continue Reading
CA Strong Authentication brings inexpensive multi- and two-factor authentication to businesses looking to protect mobile applications and devices and to prevent identity theft. Continue Reading
Expert David Strom takes a closer look at VASCO's IDENTIKEY Authentication Server, one of the leading multifactor authentication products on the market. Continue Reading
Expert David Strom looks at how SecureAuth IdP uniquely combines multifactor authentication and single sign-on login capabilities in a single product. Continue Reading
Through the Defender Management Portal, Quest Defender lets users request hard and soft tokens to provide valuable two-factor authentication and monitor all token activity. Continue Reading
Expert David Strom provides an in-depth look at Gemalto's SafeNet Authentication Service, a SaaS-based multifactor authentication product for boosting login security. Continue Reading
Okta Adaptive MFA offers businesses a range of flexible authentication methods that use different contexts to determine which factors provide users with access. Continue Reading