ESETus-ESA-SO-WEB.pdf - SOLUTION OVERVIEW Single-tap mobile-based authentication helps secure access to your data and supports compliance requirements

ESETus-ESA-SO-WEB.pdf - SOLUTION OVERVIEW Single-tap...

This preview shows page 1 - 5 out of 12 pages.

SOLUTION OVERVIEW Single-tap, mobile-based authentication helps secure access to your data and supports compliance requirements.
Image of page 1
Image of page 2
Multi-factor authentication (MFA), also known as two-factor authentication (2FA) is an authentication method which requires two independent pieces of information to verify a user’s identity. 2FA is much stronger than traditional, static password or PIN authentication. By complementing the traditional authentication with a dynamic second factor, it effectively reduces the risk of data breaches caused by weak or leaked passwords. ESET Secure Authentication provides an easy way for businesses of all sizes to implement MFA across commonly utilized systems such as VPNs, Remote Desktop, Office 365, Outlook Web Access, operating system login and more. What is multi-factor authentication? 3
Image of page 3
POOR PASSWORD HYGIENE The saying “Employees are your weakest link” comes from their potential to put your business at risk—for example, with poor password hygiene. Some workers use the same password across multiple sites and applications, and share passwords with friends and co-workers. Enforcing password policy can also be difficult, as employees often use variations of similar words or write passwords on sticky notes. A multi-factor authentication solution protects business against poor password hygiene by implementing, on top of the regular password, an additional password by generating it on the employee’s phone. Having this solution in place prevents attackers from gaining access to your systems by guessing weak passwords. DATA BREACHES Implementing multi-factor authentication (also known as two-factor authentication, or 2FA) is an effective way to reduce data breaches. It mitigates weak or stolen passwords, both of which are used by hackers to gain access to your data. Multi- factor authentication can also be implemented to limit privilege access and control privilege escalation to prevent unauthorized administrative access by employees. The top industries for data breaches are traditionally ones that have valuable data: financial, retail, healthcare and the public sector. This doesn’t mean other industries are safe; it’s simply that hackers typically weigh effort required versus the potential payoff.
Image of page 4
Image of page 5

You've reached the end of your free preview.

Want to read all 12 pages?

  • Fall '17
  • jimmy south

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask You can ask ( soon) You can ask (will expire )
Answers in as fast as 15 minutes