Monday, June 6, 2011

Authentication

How to Thwart Network Attacks with Two-Factor Authentication
How to Thwart Network Attacks with Two-Factor Authentication

With data and identity theft at record levels, the current threat to enterprise networks and individuals is significant. As we move further away from relying on passwords alone to protect access to mission-critical systems and sensitive data, more enterprises are moving toward phone-based, two-factor authentication because of the ease of use and added security offered by leveraging the telephone network. Here, Knowledge Center contributor Steve Dispensa explains how to thwart enterprise network attacks using phone-based, two-factor authentication.



No comments:

Post a Comment

Post a Comment