Multi-Factor Authentication (MFA) Complete Guide
English
By (author): James Hill Ned Zaldivar
With over 15 billion stolen credentials to work with, cybercriminals can hijack accounts, discover company secrets, compromise personal information and health care records, and steal virtually any high-value digital asset. To help deter cybersecurity disaster, more and more organizations rely on Multi-Factor Authentication (MFA). Now, there's a single source, vendor-neutral guide to today's leading MFA technologies, applications, best practices, and operations. Enterprise security experts James Hill and Ned Zaldivar reveal how MFA can prevent identity theft, unauthorized remote access, and other attacks, and guide you through configuring, operating and troubleshooting popular solutions across multiple use cases. You'll find proven techniques for integrating MFA into your current environment, leveraging MFA standards, using SMS and push notifications, and much more. A full chapter on biometrics introduces password-less systems, behavioral biometrics, WebAuthn, TouchID, and FaceID. Hill and Zaldivar present deployment best practices for on-premises, SaaS, and IaaS (Infrastructure as a Service), as well as troubleshooting techniques for DUO, Azure, and other platforms. Finally, to prepare you for the future, they offer an expert preview of emerging MFA technologies and issues.
Whatever your role in planning, deploying, or operating MFA, Multi-Factor Authentication (MFA) Complete Guide will help you protect your people, customers, and assets and sleep better at night.
See more