For Security & Risk Professionals

Atlas Shrugged: Security Pros Must Adjust To The New Realities Of A Post-RSA Breach World

Plan Your Move To Risk-Based Authentication And Software-Based Tokens

    Why Read This Report

    The RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be invincible. As a result, IT security is asking vendors tough questions about two-factor authentication (2FA) and how they protect 2FA token information. In addition, Forrester sees more and more IT security professionals moving away from hardware-based 2FA authentication tokens toward risk-based authentication (not only for customer access but also for enterprise user access) and to easier-to-manage software-based tokens.
    US $ 499
    Become A Client

    Get objective, pragmatic guidance that helps you make tough decisions and succeed in a complex world. Contact us to learn more.

    Already A Client?
    Log in to read this document.

    TABLE OF CONTENTS

    • The RSA Breach Reveals Significant Failings In Two-Factor Authentication
    • Organizations Must Complement Their 2FA Arsenal With Other Methods
    • RECOMMENDATIONS

      Demand To Know How Your 2FA Tokens Work And How Vendors Protect Them
    • Related Research Documents