A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary 2FA (2-factor authentication) and MFA (multi-factor authentication) What Is 2FA (2-Factor Authentication) and MFA (Multi-Factor Authentication)? 2-factor authentication (2FA) requires both knowledge (like a password) and something tangible (such as a hardware or software authentication system) to gain access to a protected computer system. By some definitions, multi-factor authentication (MFA) takes that one step further by also requiring something that is unique to your physical being (like a fingerprint or retina or behavior) in order to authenticate an identity. However, the term MFA is often used when there are only two factors. In traditional 2FA, the authentication device can be either hardware based (such as a token) or software based (such as a mobile app). MFA Token The role of the authentication device is to generate a unique and temporary cryptographic code that must be input, in addition to a password, to gain access to a computer resource. Without this code, an attacker who has compromised a user's password cannot gain access to the protected resource – making 2FA a minimum-security best practice. Image Multi-Factor Authentication: Why It Matters Your data’s no longer safe if it’s protected by a password alone. Even long and secure passwords can be recovered in a matter of minutes with the right software. Hackers these days, amirite?! While strong passwords still play an important role in securing access, they’re now sharing the stage with other identity-authenticating requirements. Enter MFA, which calls for users to present two or more factors to prove their identity. Additional Security Verification Unless all required factors align, it’s access denied, and that’s great news for you if someone got ahold of your password. MFA is not a simple suggestion anymore; it’s an absolute must for any SaaS app, website or SSO portal. As mentioned in the White House EO, fundamental security practices across the nation must implement MFA to ensure an additional layer of protection against unauthorized entries. Related Services Identity Advisory Services Digital Access Management Identity Governance & Administration Privileged Access Management The Solution to Multi-Factor Authentication Given the volatile state of cyberspace, we’d recommend implementing MFA as soon as possible. (Like, yesterday.) Let our Identity team help your organization carry out a stronger authentication strategy, all while reducing user friction. How to Implement MFA Image Related Terms Hardware Authentication Hardware authentication is an approach to user authentication that relies on a dedicated physical device (such as a token) held by an authorized user, in addition to a basic password, to grant access to computer resources. See Full Definition IAM - Identity and Access Management Identity Access Management (IAM) represents the processes, technology and people used to create, manage, authenticate, control and remove user (internal, external or customer) permission to corporate technology resources. See Full Definition Adaptive Authentication Adaptive authentication is a method for selecting the right authentication factors depending on a user's risk profile and tendencies, adapting the authentication type to each situation. See Full Definition Share: Contact Us
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?