MFA is an effective means to mitigate user impersonation attacks. This Solution Comparison will help security and risk management technical professionals align their requirements with the assessed technical capabilities of six leading MFA vendors.
Methodology and Criteria
Gartner Recommended Reading
Note 1: Mitigating Techniques for SMS- and Voice-Based Authentication Methods
Note 2: Preprogrammed vs. Programmable Hardware OTP Tokens