"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Best Practices for Multi-factor Authentication

White Paper Published By: Centrify
Centrify
Published:  May 26, 2016
Type:  White Paper
Length:  3 pages

High profile breaches continue to make headlines weekly. Many of these breaches involve the use of compromised credentials. Only a small percentage of cyber security professionals believe that username and password-based security remains an adequate form of protection. Many organizations are turning to multi-factor authentication (MFA) or two-factor authentication (2FA) to reduce the risk of stolen passwords. By adding a second authentication factor requirement to security policies, attackers are unable to access applications and networks or gain privileged access without the smartphone (e.g. something you have) or the fingerprint (e.g. something you are) required to complete the authentication process.

This paper examines best practices for deploying MFA.



Tags : 
authentication, multi-factor authentication, threat protection, cyber attacks, security management

Browse Technology Topics

    
    
    
    
    
    
Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory