Multi-Factor Authentication

4Q 2016 | Technology Analysis Report | AN-1886 | 27 pages | 7 tables | 3 charts | 1 figure | PDF

Download

Table of Contents

  • 1. CORPORATE MFA TRANSITIONS INTO THE IT SECURITY SURVIVAL KIT
    • 1.1. METHODOLOGY AND ASSUMPTIONS
  • 2. MFA TECHNOLOGIES
    • 2.1. THE IMPORTANCE OF SMARTPHONES
    • 2.2. THE MULTI-FACTOR AUTHENTICATION MARKET
    • 2.3. MOBILE AUTHENTICATION SOLUTIONS
    • 2.4. SOFTWARE TOKENS
    • 2.5. HARDWARE TOKENS AND SMART CARDS
    • 2.6. BIOMETRICS
  • 3. EMERGING TRENDS FOR MULTIFACTOR AUTHENTICATION
    • 3.1. THE INTEROPERABILITY VERSUS SECURITY DEBATE
    • 3.2. CORPORATE DATA INTEGRITY AND PERSONAL DEVICES
    • 3.3. CUSTOM SECURITY DEVELOPMENT BASED ON WORK PATTERNS
    • 3.4. SSO VS MFA: HEURISTIC APPROACH FOR AUTHENTICATION RISK ANALYSIS
    • 3.5. SUMMARY
  • 4. INNOVATIVE TECHNOLOGIES AND PIONEERING VENDORS
    • 4.1. INTEL
    • 4.2. VASCO
    • 4.3. SYMANTEC
    • 4.4. CENTRIFY
    • 4.5. IOVATION & LAUNCHKEY
    • 4.6. VOICE BIOMETRICS GROUP
    • 4.7. YUBICO
    • 4.8. TEXTPOWER


To continue reading:

Log In or Subscribe