On-Demand Webinar

Deploying Multi-Factor Authentication in Your Enterprise

June 14, 2017


Multi-factor authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate—at your own expense.

MFA protects you from the most common cause of a data breach: compromised user credentials. That compromise can come from user carelessness, or from password interception by a hacker-installed key logger, or via a data breach at an unrelated information provider, where the user reused their password for the sake of convenience. None of these vulnerabilities exist with MFA, because the second factor changes with each login, and the third factor is inherent in the user’s biology. MFA is the only way to positively identify a user.

MFA usage is rapidly spreading from its start with IT workers, to just about everyone in any sized enterprise. New governance rules require MFA in many vertical markets dealing with Personal Identifying Information (PII), but any business can reap MFA's benefits, with only a modest investment in software and hardware components. Moreover, the proliferation of software-as-a-service (SaaS)-based web services and business participation in social media makes MFA an essential best practice to meet your fiduciary responsibility as an enterprise technologist. 

There are many technical considerations for this advanced authentication mechanism to be safe and effective. This on-demand webinar will leave you well equipped to assess the deployment and management costs of various authentication strategies while meeting the regulatory requirements.

In this recorded webcast, security experts Mel Beckman from IT Pro and Robin Tatam from HelpSystems discuss:

  • Authentication factors such as hardware tokens, SMS messages, smartphone apps, digital certificates, and biometrics
  • Security options for each factor type, and the strengths and weaknesses of each
  • The latest government requirements for authentication in various domains, such as healthcare and finance
  • How to create a robust authentication infrastructure in your existing network
Ready to Take the Next Step?

See for yourself how simple multi-factor authentication can be. Request your demo of Access Authenticator today.

Stay up to date on what matters.