A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Optiv Cybersecurity Dictionary Breadcrumb Home Cybersecurity Dictionary Hardware Authentication What is Hardware Authentication? Hardware authentication is an approach to user authentication that relies on a dedicated physical device (such as a token) held by an authorized user, in addition to a basic password, to grant access to computer resources. The required device generates a unique and temporary cryptographic code that must be input by the user, in addition to a password, to gain access to a computer resource. The combination of the hardware authentication device and the password constitute a 2FA (2-factor authentication) system. Without the code, a hacker that has stolen a user's password will not be able to gain access to a protected system. One problem with hardware based authentication devices is that they can be lost or stolen, which can create login issues for legitimate users. Some alternatives to hardware based authentication include software based (which uses an app on a mobile phone or desktop to create the temporary codes) or SMS (which sends an SMS message to an associated mobile phone for user confirmation before an identity can be authenticated). Each system of authentication has unique advantages and disadvantages. Image Related Services Identity Governance and Admin PAMaaS Identity Advisory Services Security Operations Related Terms2FA (2-factor authentication) and MFA (multi-factor authentication)IAM - Identity and Access ManagementPAM - Privileged Access ManagementSSO - Single Sign OnIGA - Identity Governance and AdminDAG - Data Access GovernanceAdaptive Authentication Share: Contact Us
Would you like to speak to an advisor? Let's Talk Cybersecurity Provide your contact information and we will follow-up shortly. Let's Browse Cybersecurity Just looking? Explore how Optiv serves its ~6,000 clients. Show me AI Security Solutions Show me the Optiv brochure Take me to Optiv's Events page Browse all Services