Date Added: May 2013
Right now, one of your employees is accessing network resources. Do you know who it is? Recognizing and verifying access identities isn’t easy. Passwords can provide some degree of identity assurance, but they’re not infallible - anybody can write down, observe or even coerce a password from another person.
In this new technical brief, you’ll read about:
- The three types of two-factor authentication
- Why time-synchronous authorization is the most effective method
- How to verify another party’s identity