About UsBlog

Multi-factor authentication

Multi-factor authentication

Multi-factor authentication (MFA) is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something the user and only the user knows), possession (something the user and only the user has), and inherence (something the user and only the user is).

Two-factor authentication (also known as 2FA) is a type, or subset, of multi-factor authentication. It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.

A good example of two-factor authentication is the withdrawing of money from an ATM; only the correct combination of a bank card (something the user possesses) and a PIN (something the user knows) allows the transaction to be carried out.

Two other examples are to supplement a user-controlled password with a one-time password (OTP) or code generated or received by an authenticator (e.g. a security token or smartphone) that only the user possesses.

Two-step verification or two-step authentication is a method of confirming a user's claimed identity by utilizing something they know (password) and a second factor other than something they have or something they are. An example of a second step is the user repeating back something that was sent to them through an out-of-band mechanism. Or, the second step might be a six digit number generated by an app that is common to the user and the authentication system.

The most popular products in category Multi-factor authentication All category products

Specops Software Key Recovery
0
0
Status Identity
0
0
StrikeForce ProtectID
0
0
The OptimalCloud
2
15
Sterling Identity
0
0
SurePassID Universal MFA
0
0
SyferLock GridGuard
0
0
Systancia Identities and Authorizations (IGA)
0
0
Systola SystoLOCK
0
0
The SAASPASS Platform
15
9
Nok Nok S3 Authentication Suite
15
1
LastPass MFA
1
8

Suppliers Multi-factor authentication

Accelerite
AUS...
  • AUS
  • GBR
  • IND
  • LKA
  • SGP
  • USA
BICS
ARE...
  • ARE
  • BEL
  • CHE
  • SGP
  • USA
BehavioSec
AUS...
  • AUS
  • BRA
  • GBR
  • IRL
  • ISR
  • IND
  • PHL
  • USA
BioCatch
AUS...
  • AUS
  • BRA
  • GBR
  • ISR
  • IND
  • MEX
  • SGP
  • USA

Vendors Multi-factor authentication

Broadcom (CA Technologies)
AUT...
  • AUT
  • AUS
  • BEL
  • BGR
  • BRA
  • CAN
  • CHE
  • CHN
  • CZE
  • DEU
  • EST
  • ESP
  • FRA
  • GRC
  • ISR
  • IND
  • ITA
  • JPN
  • KOR
  • MYS
  • NLD
  • SGP
  • TWN
  • USA
VASCO
All countries
Intel
All countries
Accelerite
AUS...
  • AUS
  • GBR
  • IND
  • LKA
  • SGP
  • USA
Trustonic
FRA...
  • FRA
  • GBR
  • KOR
  • USA
BehavioSec
AUS...
  • AUS
  • BRA
  • GBR
  • IRL
  • ISR
  • IND
  • PHL
  • USA
BioCatch
AUS...
  • AUS
  • BRA
  • GBR
  • ISR
  • IND
  • MEX
  • SGP
  • USA

F.A.Q. about Multi-factor authentication

What is MFA?

Multi-factor authentication (MFA) combines two or more independent authentication factors. For example, suppose your website required your clients to enter something only they would know upon login (password), something they have (like a one-time smartphone authentication token provided by special software), and a biometric identifier (like a thumbprint). It is pretty hard for a mortgage cyber-attacker to have all three of those items, especially the biometric identifier.

Why do I need MFA? What are the benefits?

Passwords are becoming increasingly easy to compromise. They can be stolen, “phished”, guessed, and hacked. New technology and hacking techniques combined with the limited pool of passwords most people use for multiple accounts increases vulnerability.

How does MFA work?

Multi-factor authentication throws a few roadblocks in the hacker's pathway. Location factors are one way for a security system to identify a person's identity. For example, work schedules and location can determine whether a user is who he says he is. Time is another example of a security layer. If a person uses his phone at a job in the US, it is physically impossible for him to use it again from Europe 15 minutes later. These are especially helpful in online bank fraud and, by extension, mortgage company fraud.

Materials