Multi-Factor Authentication

Issue link:

Contents of this Issue


Page 0 of 1

Multi-Factor Authentication Safeguard access to data and applications from anywhere Modern enterprises demand agility. Yet agility and security can often seem at odds with each other. The proliferation of user types, devices and access locations increases security risks for the organization. It's no longer safe to assume that users are who they say they are and their devices are secure. The difficulty in establishing user and device trust comes from three areas: Applications are available on-premises as well as via cloud/SaaS providers. Employees, contractors and others access an organization's applications with BYOD and mobile devices. Attackers most often cause data breaches by directly accessing applications via compromised passwords and devices. As security professionals are struggling to secure the new perimeter of the modern organization, multi-factor authentication (MFA) has emerged as a must-have in any effective security strategy. The effectiveness of MFA lies in a layered approach. Compromising multiple authentication factors presents a significant challenge for attackers. Even if an attacker manages to learn the user's password, it is useless without also having possession of the additional authentication method. It works by requiring two or more of the following authentication methods: Something you know (typically a password) Something you have (a trusted device that is not easily duplicated, like a phone) Something you are (biometrics) An Extra Layer of Protection with MFA As an experienced security services provider, we know firsthand that a comprehensive security strategy involves a big-picture approach, and MFA is an important part of that story. The traditional perimeter, which was protected by firewalls, created a trusted corporate network where endpoints, servers and

Articles in this issue

Archives of this issue

view archives of Brochures - Multi-Factor Authentication