Selecting the Best Option to Deploy MFA to Secure Your Z Environment
Project and Program:
Enterprise Data Center,
Security
Tags:
Proceedings ,
SHARE Dallas 2022
80% of hackers say humans are most responsible for security breaches and 68% of hackers say MFA is one of their biggest obstacle. But how can organizations make sure that the MFA solution that they deploy is most compatible with their infrastructure and enterprise security management goals? Considerations go beyond support for security managers such as RACF, Top Secret, or XYZ, and leading authentication methods such as RSA SecurID and Certificate Authentication? In this session, we will discuss a “pre-flight check list†of sorts that every security architect and administrator needs to have handy to ensure making the most pragmatic choice tailored to their organization.
Back to Proceedings File Library