Older than the Web itself, multifactor authentication is an IT security technology method that requires people to provide multiple forms of identification or information to confirm the legitimacy of their identity for an online transaction or in order to gain access to a corporate application. The goal of multifactor authentication use is to increase the difficulty with which an adversary can exploit the login process to freely roam around personal or corporate networks and compromise computers to steal confidential information, or worse.
This series began in October 2014 and continued over several articles with the last of the series running in January 2015:
- My first article in this series on the topic talks about the fundamentals of MFA. You can read this first story in SearchSecurity here.
- My second article is on making the business case for MFA.
- My third article is how to figure out which aspects of the products are important to your situation, and what things to consider if you are going to assemble an RFP.
- The fourth article discusses specific products that are the market leaders.
And then I have specific reviews of some of the leading MFA tools:
In the 21st century we need to move to leveraging our collection of devices in an automated process and reduce the workload on the human and the sneaker Net to move codes around. My collection of devices provides the redundancy and simplicity the users need to manage the ever increasing complexity. In addition, Consumers have a built-in biological response when they lose a laptop or a phone but no reaction at all when a password is remotely stolen or guessed.