Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Implementing Multifactor Authentication
  • Table Of Contents Toc
Implementing Multifactor Authentication

Implementing Multifactor Authentication

By : Marco Fanti
4.8 (8)
close
close
Implementing Multifactor Authentication

Implementing Multifactor Authentication

4.8 (8)
By: Marco Fanti

Overview of this book

MFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity. This book is a comprehensive manual that assists you in picking, implementing, and resolving issues with various authentication products that support MFA. It will guide you to bolster application security without sacrificing the user experience. You'll start with the fundamentals of authentication and the significance of MFA to familiarize yourself with how MFA works and the various types of solutions currently available. As you progress through the chapters, you'll learn how to choose the proper MFA setup to provide the right combination of security and user experience. The book then takes you through methods hackers use to bypass MFA and measures to safeguard your applications. After familiarizing yourself with enabling and managing leading cloud and on-premise MFA solutions, you’ll see how MFA efficiently curbs cyber threats, aided by insights from industry best practices and lessons from real-world experiences. Finally, you’ll explore the significance of innovative advancements in this domain, including behavioral biometrics and passkeys. By the end of the book, you'll have the knowledge to secure your workforce and customers, empowering your organization to combat authentication fraud.
Table of Contents (20 chapters)
close
close
1
Part 1: Introduction
chevron up
4
Part 2: Implementing Multifactor Authentication
12
Part 3: Proven Implementation Strategies and Deploying Cutting-Edge Technologies

Part 1: Introduction

As our customers’, co-workers’, and partners’ lives become increasingly entwined with the digital domain, the questions of what authentication is and why it’s crucial to utilize various methods to establish one’s identity online have never been more critical. Furthermore, in a world where high-profile cyberattacks have become an all-too-common headline, the urgency to address the authentication issue has reached all organizational levels.

In Part 1, we lay the groundwork by offering a clear and engaging explanation of what authentication is and why it’s an indispensable aspect of our digital existence.

As you journey through this compelling guide, you’ll encounter various types of authentication. The book provides an insightful analysis of the strengths and weaknesses of each method, as well as recommendations on when to use—or avoid—specific approaches, ensuring you have the tools to make...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Implementing Multifactor Authentication
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon