Deploying Multi-factor Authentication in Your Enterprise

Sponsored by: HelpSystems

ITPro Today

April 25, 2017

2 Min Read
Deploying Multi-factor Authentication in Your Enterprise

View On Demand

Multi Factor Authentication (MFA) exists because of the steady increase in data breach events. A data breach can subject your organization to steep fines, litigation, and even criminal prosecution. And it opens innocent third parties to identify theft, which you may also be legally required to mitigate — at your own expense. MFA protects you from the most common cause of a data breach: compromised user credentials. That compromise can come from user carelessness, or from password interception by a hacker-installed key logger, or via a data breach at an unrelated information provider, where the user reused their password for the sake of convenience. None of these vulnerabilities exist with MFA, because the second factor changes with each login, and the third factor is inherent in the user’s biology. MFA is the only way to positively identify a user.

MFA usage is rapidly spreading from its start with IT workers, to just about everyone in any sized enterprise. New governance rules require MFA in many vertical markets dealing with Personal Identifying Information (PII), but any business can reap MFA's benefits, with only a modest investment in software and hardware components.  Moreover, the proliferation of Software-as-a-Service (SaaS)-based web services and business participation in social media makes MFA an essential best practice to meet your fiduciary responsibility as an enterprise technologist. 

There are many technical considerations for this advanced authentication mechanism to be safe and effective. This session will leave you well equipped to assess the deployment and management costs of various authentication strategies while meeting the regulatory requirements.

 In this webcast, join security experts Mel Beckman from IT Pro and Robin Tatam from HelpSystems to learn about:

  • Authentication factors such as hardware tokens, SMS messages, smartphone apps, digital certificates, and biometrics

  • Security options for each factor type, and the strengths and weaknesses of each

  • The latest governance requirements for authentication in various domains, such as healthcare and finance

  • How to create a robust authentication infrastructure in your existing network

Register Now!

If you have already registered, click here to access

Speakers:

Mel Beckman has been writing computer-related features and product reviews for more than 20 years, with a focus on IT, data centers, networking, and communications. Mel has presented hundreds of seminars on computing technology throughout the United States, Europe, and Asia.
 

Robin Tatam, Director of Security Technologies / HelpSystems
Robin is a CISM with two decades of AS/400 and IBM i consulting experience. He has a strong midrange background that includes programming in RPG and advanced CL, web enablement using CGI and IBM refacing products, as well as systems administration. An IBM-certified technical consultant, Robin conducts technical presentations online and at user group meetings, including COMMON, where he is a subject matter expert. He has written numerous articles for leading trade journals and was the co-author of the IBM Redbook, "IBM System i Security: Protecting i5/OS Data with Encryption."

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like