Advanced Search

Save Or Share This Report

For Security & Risk Professionals

Atlas Shrugged: Security Pros Must Adjust To The New Realities Of A Post-RSA Breach World

Plan Your Move To Risk-Based Authentication And Software-Based Tokens

November 4, 2011

Primary author headshot

Authors

Why Read This Report

The RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be invincible. As a result, IT security is asking vendors tough questions about two-factor authentication (2FA) and how they protect 2FA token information. In addition, Forrester sees more and more IT security professionals moving away from hardware-based 2FA authentication tokens toward risk-based authentication (not only for customer access but also for enterprise user access) and to easier-to-manage software-based tokens.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($499 USD).

Purchase

Table of Contents

  • The RSA Breach Reveals Significant Failings In Two-Factor Authentication
  • Organizations Must Complement Their 2FA Arsenal With Other Methods
  • RECOMMENDATIONS

  • Demand To Know How Your 2FA Tokens Work And How Vendors Protect Them
  • Related Research Documents

Recommended Research