Two-factor and multifactor authentication strategies

User names and passwords are no longer enough and more enterprises are deploying two-factor or multifactor authentication products. Browse the articles and advice in this section for the latest information on using strong authentication in your organization.

Two-factor and multifactor authentication strategies News

View All News

Two-factor and multifactor authentication strategies Get Started

Bring yourself up to speed with our introductory content

  • Words to go: Identity and access management security

    IT pros must keep up to date with rapidly changing identity technology and access threats. Help protect IAM security by getting familiar with this list of foundation terms. Continue Reading

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits an end user to enter one set of login credentials (such as a name and password) and be able to access multiple applications. Google, LinkedIn, Twitter and Facebook offer ... Continue Reading

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. Continue Reading

View All Get Started

Evaluate Two-factor and multifactor authentication strategies Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Two-factor and multifactor authentication strategies

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Two-factor and multifactor authentication strategies Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close