Atlas Shrugged: Security Pros Must Adjust To The New Realities Of A Post-RSA Breach World
Plan Your Move To Risk-Based Authentication And Software-Based Tokens
November 4, 2011
Why Read This Report
The RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be invincible. As a result, IT security is asking vendors tough questions about two-factor authentication (2FA) and how they protect 2FA token information. In addition, Forrester sees more and more IT security professionals moving away from hardware-based 2FA authentication tokens toward risk-based authentication (not only for customer access but also for enterprise user access) and to easier-to-manage software-based tokens.
Already a Client?
Log in to read this document.
Become a Forrester Client
Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Table of Contents
- The RSA Breach Reveals Significant Failings In Two-Factor Authentication
- Organizations Must Complement Their 2FA Arsenal With Other Methods
- Demand To Know How Your 2FA Tokens Work And How Vendors Protect Them
- Related Research Documents
Vendor Landscape: Security User Behavior Analytics (SUBA)
July 8, 2016 | Andras Cser
Market Overview: Security User Behavior Analytics (SUBA), 2016
April 7, 2016 | Andras Cser
Predictions 2016: Customers Boost IAM
November 12, 2015 | Andras Cser