“Multi-Factor Authentication is gaining traction as a best practice for enterprise security programs. It is based on the premise that traditional, single factor authentication schemes (like IDs and passwords) are relatively easy to break and as threats escalate, simply not good enough. “
– Doug Simmons, TechVision Principal Consulting Analyst
Recorded on 25 April 2019
- Thesis – Why MFA?
- Overview of MFA including Key Business Drivers
- Discuss the types of MFA approaches currently being deployed
- Overview of MFA standards
- Describe MFA in the IAM Reference Architecture
- Review of our short-list of vendors and solutions
3 reasons you should watch this video
Passwords aren’t enough
For years, computer users have been told they should have complicated passwords, including numbers, punctuation marks and other symbols, and upper- and lowercase letters. Despite those being hard to remember, people were told not to write their passwords down and were forced to make up new ones quite frequently. Most people couldn’t actually remember lots of passwords, so instead they reused a small number of passwords over and over again. These bad habits leave you one click away from a data breach.
Multi-factor Authentication is trending
To temper the risks user name and password present in today’s environment, companies are increasingly adopting additional verification factors as a check on cyber-crime. Whether it’s tokens, texts, bio-markers, or other means, users are having to increasingly prove they are who they say they are in more than one way.
But multi-factor authentication (MFA) is not a panacea. Implementing it the wrong way can cause friction in transaction processing and user frustration.
If you are looking to improve your security posture, consider ZTN. Learn the best practices for moving to a ZTN architecture, the steps that enterprises are beginning to take on that journey, and the vendor offers that help. Get to know ZTN and don’t be the mark.
© 2019 All Rights Reserved