Why password-only authentication is passe

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

Mobility, cloud, BYOD lead to surge in two-factor authentication schemes  

The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.

Ensuring that users are who they claim to be can keep enterprises from experiencing damaging security breaches and the loss or theft of data.

For many companies, the multi-factor (or two-factor) approach to authentication — the process of identifying an individual based on more than one factor such as a user name, password, smartcard or biometric attribute — promises the best way to ensure someone’s true identity.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Insider Shootout: Best security tools for small business
Join the discussion
Be the first to comment on this article. Our Commenting Policies