SlideShare is now on Android. 15 million presentations at your fingertips.  Get the app

×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Implementing two factor authentication for remote access using phone factor

by Information Security Architect on Dec 03, 2011

  • 848 views

Small and medium sized businesses cannot afford the luxury of purchasing expensive token-based two-factor authentication products, so they rely mostly on user names and passwords as methods for remote ...

Small and medium sized businesses cannot afford the luxury of purchasing expensive token-based two-factor authentication products, so they rely mostly on user names and passwords as methods for remote access security. The reliance on user names and passwords as methods of security is a weak strategy; therefore small and medium-sized businesses need to add an extra layer of security in order to strengthen their security stance.

Statistics

Views

Total Views
848
Views on SlideShare
848
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

Implementing two factor authentication for remote access using phone factor Implementing two factor authentication for remote access using phone factor Presentation Transcript