Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Multifactor
Authentication:
Methods, Use
Cases, & Products
E-guide
In this e-guide
Exploring multifactor
Cyberattacks can lead to more than $1 million in losses for
authentication benefits and small to medium-sized businesses, and can exceed several
technology p. 2 million dollars for larger corporations.
Page 1 of 51
E-guide
In this e-guide
Exploring multifactor authentication
Exploring multifactor benefits and technology
authentication benefits and
technology p. 2 David Strom, Contributor
Explore multifactor The three most commonly used authentication factors are:
authentication products in-
depth p. 35 • the knowledge factor: Something only the user knows -- such as a
username and password, a PIN or answers to security questions;
• the possession factor: Something the user has -- such as a
About SearchSecurity p. 51
smartphone, one-time passcode or smart card; and
Page 2 of 51
E-guide
The passcode generated by the key fob checks against a server located on
Explore multifactor
authentication products in- the enterprise network to ensure that they match. This server runs the
depth p. 35 identity management processes, sets up various security policies and
connects the tokens with the user directory stores, such as Active Directory
About SearchSecurity p. 51 or RADIUS.
Page 3 of 51
E-guide
Page 4 of 51
E-guide
About SearchSecurity p. 51 If enterprises haven't started using and supporting multifactor tools yet,
they'll find it takes some effort to configure and deploy. The tools have many
moving parts, and enterprises will need specialists from different parts of
Page 5 of 51
E-guide
Exploring multifactor The most important of the multifactor authentication benefits is that the
authentication benefits and tools are somewhat easier to manage. They still require some integration
technology p. 2 effort, however. To that point, some of these products include various
software agents that can protect virtual private networks, SharePoint
Three examples of multifactor servers, the Outlook Web App and database servers, for example.
authentication use cases p. 8
Finally, many providers have moved their traditional hardware-based, on-site
multifactor servers into the cloud. Most multifactor authentication vendors
Purchasing multifactor
authentication tools: What to offer both options, and many of their customers are choosing off-site
consider p. 16 deployments thanks to the flexibility the cloud offers in terms of support and
management.
Compare the top multifactor
authentication vendors p. 24
The cost of multifactor authentication
Explore multifactor
The typical cost to deploy a multifactor authentication platform is a few
authentication products in-
dollars per month, per token. However, this can add up to tens of thousands
depth p. 35
of dollars per year for companies that have a lot of users and tokens.
About SearchSecurity p. 51 Complicating the picture is that each vendor calculates the bottom line price
differently. Pricing options might include quantity discounts, multiyear price
breaks and 24/7 support fees. Some vendors charge on a per-token basis --
Page 6 of 51
E-guide
with differing rates for hard or soft tokens -- while some charge on a per-
In this e-guide user or per-server basis. Other vendors offer added components or
integration layers for an addition price.
Exploring multifactor
authentication benefits and Overall, multifactor authentication tools are worth the hassle, especially as
technology p. 2 the number of password exploits continues to rise. Businesses need better
ways to protect user login information beyond the simple username and
Three examples of multifactor password combination.
authentication use cases p. 8
The combination of a robust multifactor authentication product landscape
and user awareness of the importance of strong authentication means the
Purchasing multifactor
authentication tools: What to time is right for enterprises to consider multifactor authentication and its
consider p. 16 benefits.
About SearchSecurity p. 51
Page 7 of 51
E-guide
In this e-guide
Three examples of multifactor
Exploring multifactor authentication use cases
authentication benefits and
technology p. 2 David Strom, Contributor
Page 8 of 51
E-guide
In this e-guide
Scenario 1: Enhance RADIUS or Active Directory
Exploring multifactor
identity stores
authentication benefits and
One reason to deploy multifactor authentication is to augment the security
technology p. 2
of traditional Remote Authentication Dial-In User Service (RADIUS) or Active
Directory (AD) identity stores to better validate users and strengthen login
Three examples of multifactor
capabilities. In this scenario, the identity request passes from AD or a VPN to
authentication use cases p. 8
the multifactor server for an additional authentication step before it allows
the user to login to the network.
Purchasing multifactor
authentication tools: What to Because this was the original multifactor authentication use case for these
consider p. 16
tools, nearly all vendors support this operational method. Accordingly, if a
user's password is compromised, additional factors can ensure a person is
Compare the top multifactor actually the user attempting to log in. If an enterprise already has AD and is
authentication vendors p. 24 fairly confident its directory information is accurate, adding multifactor
authentication tools is often a relatively small and painless step toward
Explore multifactor better security.
authentication products in-
depth p. 35 In addition, many VPNs come with some kind of built-in support for
multifactor authentication services, so the level of integration shouldn't be
About SearchSecurity p. 51 daunting in that regard. If companies are comfortable with handling various
Lightweight Directory Access Protocol or RADIUS servers in their shops, it
shouldn't be too hard to add additional authentication factors.
Page 9 of 51
E-guide
In this e-guide
Scenario 2: Web services authentication
Exploring multifactor Another operational use for a multifactor authentication deployment is using
authentication benefits and it as the identity provider for a web service like Google Docs or Salesforce
technology p. 2
cloud apps. In this scenario, a login request uses the Security Assertion
Markup Language (SAML) and trusted certificates between the app and the
Three examples of multifactor multifactor server for the additional authentication step. This is the method
authentication use cases p. 8
used by Google and Apple to add second-factor features to users' Google
accounts and Apple IDs, respectively.
Purchasing multifactor
authentication tools: What to Additionally, if enterprises already use a variety of SaaS applications, they
consider p. 16 should consider adding multifactor authentication to better secure their
cloud application data.
Compare the top multifactor
authentication vendors p. 24 This method can also be used to secure logins as part of a bring-your own-
identity (BYOI) policy that uses the cloud to federate and manage identities.
Explore multifactor
Federation refers to sharing a single authentication process across multiple
authentication products in-
servers or services. While BYOI makes it easier for users to log into multiple
depth p. 35
websites, it also makes it easier for exploits to propagate. With BYOI, a bad
actor that breaches one login then gains access to the user's accounts on
About SearchSecurity p. 51
other federated sites. To address this issue, organizations need to deploy
multifactor authentication tools.
Page 10 of 51
E-guide
Page 11 of 51
E-guide
the server itself. The code makes the connection between the server and a
In this e-guide multifactor vendor's services.
Exploring multifactor This can be relatively simple to enable, especially for on-premises web apps.
authentication benefits and Users can adjust pages quickly, provided they understand the nature and
technology p. 2 security implications of the code they are adding to the pages. On the other
hand, it can be nearly impossible when a managed service doesn't allow
Three examples of multifactor users to touch the code.
authentication use cases p. 8
This operational method can be a workable alternative in instances where a
multifactor authentication product doesn't yet support SAML logins, or when
Purchasing multifactor
authentication tools: What to customized web apps need just a few lines of code to make the login more
consider p. 16 secure.
Page 12 of 51
E-guide
Exploring multifactor • How sensitive is the information users are accessing? If the answer is,
authentication benefits and "not very," then a business can probably stick with its existing
technology p. 2 authentication methods. An enterprise that allows users to access
sensitive information like its customer data should really employ
multifactor authentication.
Three examples of multifactor
authentication use cases p. 8 • Is compliance an issue? Government regulations require
organizations in some sectors to implement stronger security
Purchasing multifactor measures to ensure the data is secure. These industries are mainly in
authentication tools: What to finance and healthcare, with stricter standards placed on their data
consider p. 16 due to patient confidentiality. Many regulations, like HIPAA and the
New York Department of Financial Services (NYDFS) for example,
mandate companies implement multifactor authentication so only
Compare the top multifactor authorized individuals have access to sensitive information. HIPAA
authentication vendors p. 24 provides a compliance checklist to ensure multifactor authentication
use. Enterprises must also be able to prove they comply with these
Explore multifactor regulations. Businesses should confirm each vendor under
authentication products in- consideration provides an audit log (a record of system activities, for
depth p. 35 compliance purposes).
Page 13 of 51
E-guide
Page 14 of 51
E-guide
Three examples of multifactor • If a business mostly uses on-premises servers, it might be better off
authentication use cases p. 8 using Windows Server's built-in password-strengthening policies, at
least to start. Monitor how much users push back when they have to
regularly change passwords and make them more complex.
Purchasing multifactor
authentication tools: What to
Making a business case for multifactor authentication clearly requires some
consider p. 16
forethought and planning. Companies can apply numerous multifactor
authentication use cases for the technology in different ways to different
Compare the top multifactor
parts of an IT infrastructure. Understanding how multifactor authentication
authentication vendors p. 24
operates ahead of time will be helpful when it comes time to select a
provider.
Explore multifactor
authentication products in-
depth p. 35
Linda Rosencrance contributed to this report.
Page 15 of 51
E-guide
In this e-guide
Purchasing multifactor authentication
Exploring multifactor tools: What to consider
authentication benefits and
technology p. 2 David Strom, Contributor
About SearchSecurity p. 51
Page 16 of 51
E-guide
In this e-guide
Do I need to give non-employees access to corporate
Exploring multifactor
resources?
authentication benefits and
Conduct an end-user device census if possible. This will help your enterprise
technology p. 2
understand the total population it needs to protect with these tools.
Enterprises should pay close attention to which offices non-employees
Three examples of multifactor
connect to; whether they are consultants, partners or contract workers; and
authentication use cases p. 8
whether their corporate Active Directory stores already list those users.
Purchasing multifactor Companies with a geographically distributed workforce may be better off
authentication tools: What to using mobile apps or software-based tokens rather than physical ones.
consider p. 16
Depending on the results of the census, enterprises may find they're better
off securing traditional VPNs or terminal servers with additional factors for
Compare the top multifactor remote access. If so, companies should look at the vendors that support
authentication vendors p. 24 their VPNs to make integration easier.
Explore multifactor
authentication products in- How does the multifactor authentication software
depth p. 35
connect to my Active Directory store?
About SearchSecurity p. 51 Some multifactor authentication tools add agents, some make use of web
services, some provide two-way synchronization and some go only one way.
Page 17 of 51
E-guide
In this e-guide
Should I purchase a cloud-based multifactor
Exploring multifactor
authentication server?
authentication benefits and
This decision depends on if your organization is a server-hugger and how
technology p. 2
widely the company has deployed its own assets in the cloud. How many
cloud apps does it currently support and what are its plans for the future?
Three examples of multifactor
The more apps and servers an enterprise has in the cloud, the more the
authentication use cases p. 8
organization will want to deploy multifactor tools to make use of its own
cloud-based services rather than on-premises servers.
Purchasing multifactor
authentication tools: What to Some vendors offer both versions but with different functionality. Others
consider p. 16
charge differently for cloud-based services.
Compare the top multifactor The cloud-based multifactor authentication benefits include eliminating the
authentication vendors p. 24 need to install and maintain on-premises platforms and the associated local
infrastructure. Because cloud-based multifactor products can be easier to
Explore multifactor set up, they can be especially appealing to smaller organizations, as well as
authentication products in- with those that already have a significant collection of cloud servers in their
depth p. 35 own IT infrastructures. Cloud-based platforms can also help companies
increase flexibility, as well as save on management and help desk costs
About SearchSecurity p. 51 compared to on-premises platforms.
Page 18 of 51
E-guide
In this e-guide
Which servers or applications are most at risk?
Exploring multifactor Before buying any multifactor authentication tool, look closely at the apps
authentication benefits and the tool supports and how the tool supports those apps.
technology p. 2
Start by implementing multifactor authentication for the most at-risk
Three examples of multifactor applications and those that contain the most sensitive data. Then, work
authentication use cases p. 8 down the list to those apps that are less sensitive or critical to determine
whether the cost of the deployment -- and the risks multifactor
Purchasing multifactor authentication can mitigate -- provides enough ROI.
authentication tools: What to
consider p. 16 Some organizations start by deploying multiple factors to protect remote
access, and then move onto more mission-critical enterprise applications.
Compare the top multifactor
Others do the reverse. Either way, admins must carefully look at the
authentication vendors p. 24 documentation available to configure and debug the installation of each
supported app.
Explore multifactor
Why? Because the debugging phase requires a lot of time and companies
authentication products in-
will need all the help they can get. It's important to take this into
depth p. 35
consideration when purchasing a multifactor authentication tool, as some
servers are more at risk than others.
About SearchSecurity p. 51
Page 19 of 51
E-guide
In this e-guide
Will users need multiple types of tokens and access
Exploring multifactor
methods?
authentication benefits and
Some multifactor authentication devices are better at handling multiple
technology p. 2
tokens and access methods than others. Some vendors set up pricing to
make it easier or harder to handle multiple token types.
Three examples of multifactor
authentication use cases p. 8 Meanwhile, some let customers set up multiple token types for each user for
authentication. This allows a user to choose whichever token is most
Purchasing multifactor convenient at login time.
authentication tools: What to
consider p. 16
Page 20 of 51
E-guide
The flip side of this is how access is set up for hundreds of users and
In this e-guide understanding the workflows involved. Look at how each product creates
and modifies its security policies and whether it provides a consistent set of
Exploring multifactor policies across the entire user base or if the policy collections differ
authentication benefits and depending on the token types or mobile OSes.
technology p. 2
Three examples of multifactor How much business do end users conduct on mobile
authentication use cases p. 8
devices?
Purchasing multifactor Ensure any multifactor authentication tool supports the current inventory
authentication tools: What to and versions of mobile devices. This means organizations must optimize the
consider p. 16
identity authentication experience around mobile use cases.
Compare the top multifactor Part of the product evaluation should be to determine if the products
authentication vendors p. 24 support a particular mobile operating system, how the product supports it,
as well as the difficulty of the sign-on process. This evaluation is worth it
Explore multifactor once the tool is implemented and users begin seeing the multifactor
authentication products in- authentication benefits.
depth p. 35
Page 21 of 51
E-guide
Page 22 of 51
E-guide
In this e-guide
How many multifactor authentication elements need
Exploring multifactor
to be installed?
authentication benefits and
Some vendors have multiple server software components or multiple identity
technology p. 2
agents. Others are less complex. The decision to purchase multifactor
authentication tools should depend on an organization's needs, as well as
Three examples of multifactor
the resources available to implement and support the software.
authentication use cases p. 8
Purchasing multifactor
Should I purchase a single sign-on product with
authentication tools: What to
consider p. 16 multifactor authentication included?
Single sign-on (SSO) is great if an organization already has a lot of uniformly
Compare the top multifactor
used SaaS and web apps across the enterprise and wants to provide end-
authentication vendors p. 24
user sign-on portal pages to access all of them. SSO falls down, however, if
users' app portfolios vary widely or if they don't support the collection of
Explore multifactor multifactor methods.
authentication products in-
depth p. 35 Linda Rosencrance contributed to this report.
About SearchSecurity p. 51
Next Article
Page 23 of 51
E-guide
In this e-guide
Compare the top multifactor
Exploring multifactor authentication vendors
authentication benefits and
technology p. 2 David Strom, Contributor
Compare the top multifactor Here are four of the leading products in the MFA space:
authentication vendors p. 24
• RSA Authentication Manager, the platform behind its SecurID
Explore multifactor
technology;
authentication products in-
• Symantec VIP -- Validation and ID Protection;
depth p. 35
• CA Strong Authentication; and
• OneSpan Authentication Server -- formerly Vasco Identikey
Authentication Server.
About SearchSecurity p. 51
All four are well-established multifactor authentication tools that can handle
a wide variety of situations, token types and applications.
Page 24 of 51
E-guide
None of the four major multifactor authentication products deliver the top
Explore multifactor three authentication applications -- Active Directory, web services
authentication products in- verification and web server augmentation -- together in a single product.
depth p. 35
Rather, each requires add-on modules for either Security Assertion Markup
Language (SAML) or Active Directory support.
About SearchSecurity p. 51
For example, RSA's Authentication Manager collaborates with its Adaptive
Federation product to provide SAML web services integration, and
Page 25 of 51
E-guide
Exploring multifactor This is typical of the MFA product space, and it's why it's so important to
authentication benefits and understand which applications -- and under which circumstances -- an
technology p. 2 organization may want to deploy for additional factors.
While this helps widen a company's reach, it also increases the level of
Compare the top multifactor
complexity of installation and operation, as multiple pieces need to be
authentication vendors p. 24
configured and tracked. Some multifactor authentication vendors' products
have both cloud and on-premises pieces that need to work together to
Explore multifactor
authenticate users to both kinds of servers and services.
authentication products in-
depth p. 35
Enterprises may want to consider a single sign-on (SSO) product instead of
an MFA product for certain circumstances. However, you can also
About SearchSecurity p. 51 coordinate MFA with SSO tools -- see sidebar on SSO versus MFA for more
on how to make this decision.
Page 26 of 51
E-guide
In this e-guide
SSO or MFA: Which authentication method is
Exploring multifactor
better?
authentication benefits and
As you consider MFA products, you should also consider how to coordinate
technology p. 2
them with SSO tools. Integrating MFA with SSO enables you to define
stronger security policies for accessing systems that are very sensitive.
Three examples of multifactor
authentication use cases p. 8 What is happening, though, is SSO vendors are branching out into the MFA
space with support for a variety of tokens and access
Purchasing multifactor methods. SecureAuth and Ping Identity are products typical of this genre.
authentication tools: What to Why would an enterprise use SSO rather than a pure-play MFA tool? There
consider p. 16
are a few reasons.
Compare the top multifactor First, if a company uses a lot of cloud-based services, it may want a better
authentication vendors p. 24 mechanism for users to connect to them. If provisioned correctly, an SSO
tool can sign onto these services automatically, all without users having to
Explore multifactor remember their passwords -- and with very strong passwords to boot.
authentication products in-
depth p. 35 Many of the more popular cloud services support the SAML 2.0 standard,
which is what most SSO tools use to create their connection. If an
enterprise's set of services doesn't yet support SAML, then the organization
About SearchSecurity p. 51
probably won't be happy with either SSO or MFA tools. However, if most of a
company's apps are inside its data center, then it will probably want to make
Page 27 of 51
E-guide
Exploring multifactor Second, if companies are less concerned about the additional authentication
authentication benefits and factors than about overall identity preservation and integrity, then SSO may
technology p. 2 be a better option. However, if an organization has one or two internal apps
that it must protect with multiple factors, then it will probably be better off
Three examples of multifactor going the MFA route.
authentication use cases p. 8
There is also the option of integrating both SSO and MFA together, which
companies usually offer, as well.
Purchasing multifactor
authentication tools: What to
consider p. 16
Complexity workflow
Compare the top multifactor
Part of the evaluation process with MFA tools is observing how normal, day-
authentication vendors p. 24
to-day activities function with these systems, such as registering new tokens
and new users, setting up protection for a new application, modifying
Explore multifactor
security policies, and figuring out why a user can't log into corporate
authentication products in-
applications.
depth p. 35
Some of the products offer a lot more flexibility when it comes to token
About SearchSecurity p. 51 workflow processes. This reflects -- in part -- how long they have been in the
multifactor business. For example, some products enable enterprises to add
additional factor authentication steps at various places in the login dialogs.
Page 28 of 51
E-guide
Others have more limitations, such as programs that place users in a self-
In this e-guide service portal where they can set up their multifactor authentication
particulars.
Exploring multifactor
authentication benefits and
technology p. 2
Reporting
Three examples of multifactor All four of these products include different reports and various format
authentication use cases p. 8 export options.
Page 29 of 51
E-guide
While Symantec VIP offers fewer customizable reports than its competitors,
In this e-guide it does provide exporting capabilities, which is the minimum its competitors
offer.
Exploring multifactor
authentication benefits and All of the leading MFA products, however, offer the ability to schedule
technology p. 2 specific reports and have real-time monitoring for alerts and other activities.
Explore multifactor Access to a particular business application goes through a series of trust
authentication products in- hurdles, with riskier situations requiring more security, so users don't
depth p. 35
necessarily know their logins are being vetted more carefully. Moreover, this
all happens in real time, just like the typical multifactor methods. This is
About SearchSecurity p. 51 similar to how many next-generation firewalls operate with their own risk
scoring tools of internal network packet behavior.
Page 30 of 51
E-guide
Page 31 of 51
E-guide
In this e-guide
Mobile support
Exploring multifactor As more workers use their mobile devices for their computing needs, MFA
authentication benefits and vendors have to support logins from mobile devices and web-based
technology p. 2
applications. Enterprises may also want a way to store multiple factors on
users' phones and tablets so they don't have to carry -- and the company
Three examples of multifactor doesn't have to deploy and support -- traditional, hardware-based key fob
authentication use cases p. 8
tokens.
Purchasing multifactor Each of these four products still supports the four mobile operating systems
authentication tools: What to most commonly found in enterprises: Apple iOS, Android, Windows Phone
consider p. 16 and BlackBerry. This is true for most multifactor authentication vendors
these days, so it shouldn't be an issue except in the case of aging phone
Compare the top multifactor OSes or the odd Android handset in the mobile fleet that a chosen vendor
authentication vendors p. 24 does not cover.
Explore multifactor
Be sure to check the fine print for the supported OS versions when
authentication products in- investigating multifactor authentication tools.
depth p. 35
About SearchSecurity p. 51
Multiple token support
RSA, Symantec and OneSpan are top choices when it comes to tokens.
Each product has a wide collection of hardware and software tokens that
Page 32 of 51
E-guide
Purchasing multifactor
authentication tools: What to FIDO support
consider p. 16
Many vendors -- and other organizations -- with an interest in MFA are
Compare the top multifactor
members of the FIDO Alliance, including RSA, CA Technologies, SafeNet
authentication vendors p. 24 and OneSpan.
About SearchSecurity p. 51
Page 33 of 51
E-guide
In this e-guide
Conclusion
Exploring multifactor Any of these four MFA products would do a solid job providing multifactor
authentication benefits and authentication protection. All of them support mobile token methods, have
technology p. 2
somewhat flexible authentication methods and have moved into risk-based
methods.
Three examples of multifactor
authentication use cases p. 8 The differences are more a matter of packaging, pricing and whether an
organization's staff can understand and act upon the various reports the
Purchasing multifactor products produce. These four products should be in the starting lineup for
authentication tools: What to any requests for proposals or pilot projects.
consider p. 16
Linda Rosencrance contributed to this report.
Compare the top multifactor
authentication vendors p. 24
Next Article
Explore multifactor
authentication products in-
depth p. 35
About SearchSecurity p. 51
Page 34 of 51
E-guide
In this e-guide
Explore multifactor authentication
Exploring multifactor products in-depth
authentication benefits and
technology p. 2 Linda Rosencrance, Contributor
Explore multifactor
authentication products in-
AuthPoint
depth p. 35
AuthPoint is a cloud-based MFA tool from WatchGuard Technologies Inc.
aimed at small to midsize businesses.
About SearchSecurity p. 51
Page 35 of 51
E-guide
Page 36 of 51
E-guide
Page 37 of 51
E-guide
Page 38 of 51
E-guide
In this e-guide
Interoute MFA
Exploring multifactor Interoute MFA, a cloud-based service from Interoute Communications Ltd.,
authentication benefits and enables organizations to replace user-generated passwords with one-time
technology p. 2
codes generated by hardware or software-based tokens. This software
offers strong authentication to help enterprises protect assets, validate
Three examples of multifactor authorized users and ensure regulatory compliance.
authentication use cases p. 8
Interoute provides management services via a secure VPN access service
Purchasing multifactor that has firewalls at each end, ensuring a separate connection for each
authentication tools: What to client. The company also offers a flexible approach, allowing customers to
consider p. 16 purchase some or all of the services covered by its multifactor
authentication tool.
Compare the top multifactor
authentication vendors p. 24 The features of Interoute MFA include:
Page 39 of 51
E-guide
Page 40 of 51
E-guide
About SearchSecurity p. 51
Page 41 of 51
E-guide
In this e-guide
OneSpan Authentication Server -- formerly Vasco
Exploring multifactor
Identikey Authentication Server
authentication benefits and
OneSpan Inc. Authentication Server is a comprehensive, centralized and
technology p. 2
flexible authentication platform that aims to deliver complete authentication
lifecycle management in a single integrated system.
Three examples of multifactor
authentication use cases p. 8 OpenSpan's multifactor authentication products enable users to securely
access corporate resources and applications, including SSL VPNs and
Purchasing multifactor cloud-based apps. OneSpan Authentication Server supports all of a
authentication tools: What to company's authentication and signature tools and simplifies authentication
consider p. 16
management for users and administrators.
Compare the top multifactor Any organization can utilize OneSpan Authentication Server, including its
authentication vendors p. 24 banking and financial services, if the company wants to centralize and
simplify the way it manages its authentication processes for employees,
Explore multifactor partners and customers.
authentication products in-
depth p. 35 The features of OneSpan Authentication Server include:
Page 42 of 51
E-guide
Page 43 of 51
E-guide
Page 44 of 51
E-guide
Exploring multifactor
authentication benefits and RSA Authentication Manager
technology p. 2
RSA Authentication Manager, from RSA Security LLC, is the platform behind
Three examples of multifactor the RSA SecurID security token product. RSA Authentication Manager
authentication use cases p. 8 offers multifactor authentication as a virtual or hardware appliance. An
enterprise can also mix and match within the same implementation.
Purchasing multifactor
The software enables RSA SecurID administrators to centrally manage
authentication tools: What to
consider p. 16
authentication methods, user profiles, applications and agents across
multiple physical sites. RSA Authentication Manager also verifies
authentication requests and centrally administers enterprises' authentication
Compare the top multifactor
authentication vendors p. 24
policies for their end users.
Page 45 of 51
E-guide
Page 46 of 51
E-guide
notifications, USB keys and push to accept. The tool only forces a
In this e-guide multifactor authentication step if it identifies risk.
Exploring multifactor SecureAuth IdP is available for single sign-on, as well as for multifactor
authentication benefits and authentication. A cloud-based tool, SecureAuth IdP is appropriate for
technology p. 2 medium and large enterprises that use a range of SaaS-based services.
Page 47 of 51
E-guide
Page 48 of 51
E-guide
Page 49 of 51
E-guide
Symantec VIP enables organizations to secure all their users -- i.e., their
In this e-guide employees, remote workers, partners, contractors, vendors and customers.
However, some users have said that it's a hassle to add new tokens.
Exploring multifactor
authentication benefits and The features of Symantec VIP include:
technology p. 2
• Cloud-based infrastructure: Delivers authentication without the need
for a dedicated on-premises hardware server.
Three examples of multifactor
• Integration with single sign-on: The VIP Access Manager single sign-
authentication use cases p. 8
on creates one access point to secure cloud and on-premises apps.
• Risk-based intelligent authentication: Uses behavior and device
Purchasing multifactor profiling to prevent risky login attempts but doesn't change a
authentication tools: What to legitimate user's login experience.
consider p. 16 • Biometric fingerprint, proximity login and push notification: Eliminates
the need for passwords through the use of biometric fingerprints,
hands-free proximity login, as well as one-tap or one-swipe push
Compare the top multifactor
verification.
authentication vendors p. 24
• Wide range of OTP options: Organizations can deploy hardware
tokens and free software or mobile OTP credentials, as well as email,
Explore multifactor out-of-band support via SMS text messages and phone calls.
authentication products in- • Embedded two-factor authentication: Allows enterprises to add
depth p. 35 strong authentication using the VIP web services APIs for their web
applications or by embedding VIP into their mobile apps with the VIP
Credential Development Kit.
About SearchSecurity p. 51
About SearchSecurity
Page 50 of 51
E-guide
Purchasing multifactor
authentication tools: What to
consider p. 16
For further reading, visit
SearchSecurity.com
Compare the top multifactor Images; Fotalia
authentication vendors p. 24
©2019 TechTarget. No part of this publication may be transmitted or reproduced in any form or by any means without
written permission from the publisher.
Explore multifactor
authentication products in-
depth p. 35
About SearchSecurity p. 51
Page 51 of 51