Skip to main content

Multi-Factor Authentication (MFA)

In 2019, Ponemon report showed that global data breaches rose from 826 million in 2017 to 2.3 billion in 2018.  This is a marked increase in the cost of those data breaches. The UK showed the highest rise in costs of 31% over that period.

Vulnerable password reset processes, human behavior and inadequate technology has meant predictions that alternative authentication mechanisms need to be found to replace the password.  However, without cost effective and proven alternatives the password will still be utilized by organisations either in conjunction with other forms of authentication or in background mode with biometrics.

The issue today is not that passwords are out-dated, but that in many cases a User name and Password are not enough. Organisations need to accept that no single authentication method is sufficient for users with a high security profile to properly establish their identity.

Multi-factor authentication is key

to strengthening security and compliance and to prevent data breaches. However, too often it is seen as a one size fits all approach, which is costly and over-bearing.

The requirement is a platform that can cost-effectively enroll all users.  This platform should offer a choice depending on risks posed and needs to accommodate different types of authentication.  Thus allowing organisations to base their choice of solution on the security profile of the user.

We can deliver an integrated platform that integrates with all major authentication methods.  This provides an holistic approach to self service password reset, service desk authentication and other areas of the organization.

Our Solutions

We support and integrate with a broad range of MFA tools from suppliers such as Microsoft, Google, Gemalto, UbiKey, Duo, plus many more.

Our integrations allow users to choose their preferred method of authentication when they enroll.

The key benefits of the approach are:

  • Most cost effective and secure approach to MFA.
  • Cost effective enrolment processes
  • Future proofing IT security.
  • Protecting current capital investment.
  • Migration path to a zero trust environment.
  • Rescue processes for authentication tools other than passwords.