Summary
The RSA breach presents IT security professionals with significant challenges regarding authentication and questions the security of the bulletproof hardware token hitherto thought to be invincible. As a result, IT security is asking vendors tough questions about two-factor authentication (2FA) and how they protect 2FA token information. In addition, Forrester sees more and more IT security professionals moving away from hardware-based 2FA authentication tokens toward risk-based authentication (not only for customer access but also for enterprise user access) and to easier-to-manage software-based tokens.
Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
- Stay ahead of changing market and customer dynamics with the latest insights.
- Partner with expert analysts to make progress on your top initiatives.
- Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($1495).