Security Investigate

Guide to Evaluating Two-Factor Authentication Solutions

Download now Free registration required

Executive Summary

Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user’s password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication is no longer optional for many organizations.

  • Format: PDF
  • Size: 173.44 KB