INDEX

Multi-Factor Authentication

Table of Contents

  • 1. CORPORATE MFA TRANSITIONS INTO THE IT SECURITY SURVIVAL KIT
    • 1.1. METHODOLOGY AND ASSUMPTIONS
  • 2. MFA TECHNOLOGIES
    • 2.1. THE IMPORTANCE OF SMARTPHONES
    • 2.2. THE MULTI-FACTOR AUTHENTICATION MARKET
    • 2.3. MOBILE AUTHENTICATION SOLUTIONS
    • 2.4. SOFTWARE TOKENS
    • 2.5. HARDWARE TOKENS AND SMART CARDS
    • 2.6. BIOMETRICS
  • 3. EMERGING TRENDS FOR MULTIFACTOR AUTHENTICATION
    • 3.1. THE INTEROPERABILITY VERSUS SECURITY DEBATE
    • 3.2. CORPORATE DATA INTEGRITY AND PERSONAL DEVICES
    • 3.3. CUSTOM SECURITY DEVELOPMENT BASED ON WORK PATTERNS
    • 3.4. SSO VS MFA: HEURISTIC APPROACH FOR AUTHENTICATION RISK ANALYSIS
    • 3.5. SUMMARY
  • 4. INNOVATIVE TECHNOLOGIES AND PIONEERING VENDORS
    • 4.1. INTEL
    • 4.2. VASCO
    • 4.3. SYMANTEC
    • 4.4. CENTRIFY
    • 4.5. IOVATION & LAUNCHKEY
    • 4.6. VOICE BIOMETRICS GROUP
    • 4.7. YUBICO
    • 4.8. TEXTPOWER


To continue reading:

Log In or Subscribe

This report deals with the emerging multifactor authentication technologies in the enterprise segment. From simple hardware-based tokenization and smart card authentication, to popular software-based OTP methods, GPS tracking, credential management, and biometrics the report investigates the influx of personal devices in the workplaces and the possibility of leveraging them as part of a sophisticated MFA adoption. Further, innovative approaches to MFA such as behavioral work pattern analysis and heuristic-based risk assessment models are discussed. A number of innovative solutions from pioneering vendors including Intel, Centrify, Yubico, Iovation, Vasco, and VBG are analyzed as archetypical examples of emerging technologies.

Table of Contents

  • 1. CORPORATE MFA TRANSITIONS INTO THE IT SECURITY SURVIVAL KIT
    • 1.1. METHODOLOGY AND ASSUMPTIONS
  • 2. MFA TECHNOLOGIES
    • 2.1. THE IMPORTANCE OF SMARTPHONES
    • 2.2. THE MULTI-FACTOR AUTHENTICATION MARKET
    • 2.3. MOBILE AUTHENTICATION SOLUTIONS
    • 2.4. SOFTWARE TOKENS
    • 2.5. HARDWARE TOKENS AND SMART CARDS
    • 2.6. BIOMETRICS
  • 3. EMERGING TRENDS FOR MULTIFACTOR AUTHENTICATION
    • 3.1. THE INTEROPERABILITY VERSUS SECURITY DEBATE
    • 3.2. CORPORATE DATA INTEGRITY AND PERSONAL DEVICES
    • 3.3. CUSTOM SECURITY DEVELOPMENT BASED ON WORK PATTERNS
    • 3.4. SSO VS MFA: HEURISTIC APPROACH FOR AUTHENTICATION RISK ANALYSIS
    • 3.5. SUMMARY
  • 4. INNOVATIVE TECHNOLOGIES AND PIONEERING VENDORS
    • 4.1. INTEL
    • 4.2. VASCO
    • 4.3. SYMANTEC
    • 4.4. CENTRIFY
    • 4.5. IOVATION & LAUNCHKEY
    • 4.6. VOICE BIOMETRICS GROUP
    • 4.7. YUBICO
    • 4.8. TEXTPOWER