Selecting the Best Option to Deploy MFA to Secure Your Z environment
Project and Program:
Enterprise Data Center
Tags:
Proceedings ,
SHARE Columbus 2022
80% of hackers say humans are most responsible for security breaches, and 68% of
hackers say MFA is one of their biggest obstacles. How can organizations ensure
that the MFA solution they deploy is most compatible with their infrastructure
and enterprise security management goals? The considerations go beyond support
for security managers, such as RACF, Top Secret, or XYZ, and leading
authentication methods such as RSA SecurID and Certificate Authentication? In
this session, the speaker discusses a "pre-flight checklist" of sorts that every
security architect and administrator should have on-hand to ensure they make the
most pragmatic choice tailored to their organization.
Back to Proceedings File Library