Buyer’s Guide to 9 multi-factor authentication products

Since we last reviewed two-factor authentication products, the market has moved beyond two-factor authentication toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products. See the full review.
To read this article in full or to leave a comment, please click here
Read more: Buyer’s Guide to 9 multi-factor authentication products
Story added 6. June 2016, content source with full text you can find at link above.
More antivirus and malware news?
- Bug bounty programs leaving less critical flaws undiscovered
- Resolved: Hardware Move – Multiple Services Unavailable – January 9, 2014
- Detecting Fraud – Every Step of the Way
- Securing SCADA systems still a piecemeal affair
- FreeBSD shutters some servers after SSH key breach
- iPhone upgraders leave nearly $13.5B in old hardware to collect dust
- Apple Blocked 1.7 Million Applications From App Store in 2022
- Online data broker Spokeo settles FTC charges for $800,000
- Which is the most popular antivirus software?
- Lawyer suggests tying access to encryption to verified ID