With over 15 billion stolen credentials to work with, cybercriminals can
hijack accounts, discover company secrets, compromise personal
information and health care records, and steal virtually any high-value
digital asset. To help deter cybersecurity disaster, more and more
organizations rely on Multi-Factor Authentication (MFA). Now, there's a
single source, vendor-neutral guide to today's leading MFA technologies,
applications, best practices, and operations. Enterprise security
experts James Hill and Ned Zaldivar reveal how MFA can prevent identity
theft, unauthorized remote access, and other attacks, and guide you
through configuring, operating and troubleshooting popular solutions
across multiple use cases. You'll find proven techniques for integrating
MFA into your current environment, leveraging MFA standards, using SMS
and push notifications, and much more. A full chapter on biometrics
introduces password-less systems, behavioral biometrics, WebAuthn,
TouchID, and FaceID. Hill and Zaldivar present deployment best practices
for on-premises, SaaS, and IaaS (Infrastructure as a Service), as well
as troubleshooting techniques for DUO, Azure, and other platforms.
Finally, to prepare you for the future, they offer an expert preview of
emerging MFA technologies and issues.
Whatever your role in planning, deploying, or operating MFA,
Multi-Factor Authentication (MFA) Complete Guide will help you protect
your people, customers, and assets - and sleep better at night.