BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Multifactor authentication: A buyer's guide to MFA products

Last updated:May 2015

Editor's note

Multifactor authentication (MFA) is a security technology that takes something that end users possess, such as a security token (e.g., a key fob, fingerprint, software on a smartphone), and pairs it with a standard username/password login to prove they're who they claim to be. The purpose of MFA is to toughen login credentials to prevent malicious actors from wreaking havoc by accessing a company network surreptitiously or pilfering private data.

In this buyer's guide, readers will learn about the different methods of MFA and how the technologies have evolved over the years from key fobs to smartphones and mobile devices, and how to identify the three operational scenarios for implementation when evaluating this security technology in the enterprise. It also lays out what enterprises need to know before investing and presents direct MFA product comparisons and product overviews of some of the top MFA products available today.

1The business case for multifactor authentication

Identify which of the three operational scenarios apply to a potential multifactor authentication implementation when evaluating the business cases for the security technology in the enterprise.

2Multifactor authentication procurement

Ask these questions and follow these criteria when shopping for MFA products.

3The top multifactor authentication products compared

What makes a particular multifactor authentication tool right for a particular enterprise? Here we compare several leading MFA vendors to review the pros and cons of their products to help you decide which one may be right for your organization.

4A who's who of the market's leading multifactor authentication vendors

Multifactor authentication can be a critical component of an enterprise security strategy. Here's a look at the top MFA products in the industry.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close