Every asset on your network and in the cloud has privileged accounts—everything from network devices like routers and switches to server operating systems to the databases and applications on those servers and, of course, all levels of cloud assets from IaaS to SaaS and in between. And with today’s risks, privileged sessions need more than passwords. If you pick and choose which assets to protect with multi-factor authentication (MFA), you are leaving layers of your network vulnerable.
But MFA can be disruptive to user productivity and the overall access experience. For instance, think about the network admin who manages the firewall at each branch. If he/she needs to log on to each one to make a change, will he/she be slowed down by one-time-password (OTP) requests? Or, what about the team with a couple thousand servers? Do they have to install, configure and maintain an agent on each one of those servers just for MFA? Deploying MFA can also be complex because of all the different ways to do it, all the form factors and methods and their associated integration challenges. However, there are ways to provide strong authentication that minimizes disruption and eliminates the implementation and maintenance burdens.
In this webinar, Randy Smith of Ultimate Windows Security joins authentication integration expert Sudarsan Kannan from RSA to review four different techniques for deploying multi-factor authentication, to ensure that your privileged users are who they claim to be. You’ll see how they work technically, how they differ architecturally and which problems each approach solves.