Atlas Shrugged: Security Pros Must Adjust To The New Realities Of A Post-RSA Breach World
Plan Your Move To Risk-Based Authentication And Software-Based Tokens
November 4, 2011
Why Read This Report
The RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be invincible. As a result, IT security is asking vendors tough questions about two-factor authentication (2FA) and how they protect 2FA token information. In addition, Forrester sees more and more IT security professionals moving away from hardware-based 2FA authentication tokens toward risk-based authentication (not only for customer access but also for enterprise user access) and to easier-to-manage software-based tokens.
Already a Client?
Log in to read this document.
Become a Forrester Client
Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Table of Contents
- The RSA Breach Reveals Significant Failings In Two-Factor Authentication
- Organizations Must Complement Their 2FA Arsenal With Other Methods
- Demand To Know How Your 2FA Tokens Work And How Vendors Protect Them
- Related Research Documents
Vendor Landscape: Web Application Firewalls
January 20, 2017 | Amy DeMartine
Forrester's Risk-Driven Identity And Access Management Process Framework
January 6, 2017 | Andras Cser
Forrester's Customer IAM Security Maturity Assessment Model
December 12, 2016 | Andras Cser