Table of Contents
- Summary
- Multifactor Authentication Primer
- Report Methodology
- Decision Criteria Analysis
- Evaluation Metrics
- Key Criteria: Impact Analysis
- Analyst’s Take
- Methodology
- About Andrew Green
- About GigaOm
- Copyright
1. Summary
Multifactor authentication (MFA) addresses one of the most vulnerable elements in cybersecurity—humans. As most attacks are enabled through social engineering, MFA intervenes by verifying identity through methods such as biometrics or physical tokens that can’t be shared unknowingly by users. Even if a password is compromised, the likelihood of a malicious actor having access to a physical token or the user’s biometrics is low, especially in a remote environment.
MFA can verify identity in three ways, by using:
- Something the user knows: Good old-fashioned passwords
- Something the user has: An item only the authorized person typically has access to, such as an ID card, token, or a smartphone
- Something the user is: Biometric data that belongs to the authorized person—such as a fingerprint or face scan—available on most smartphones or laptops today
Despite the irrefutable benefits of MFA, poor user experience (UX) has hindered its adoption. Especially for users who haven’t bought into the solution’s benefits, additional verification steps can be seen as a nuisance, an inconvenience blocking access to the IT resources they need.
Ensuring a seamless experience while also maintaining security is one of the main challenges MFA solutions need to address, and there are a number of ways they can reduce the burden on the user. Solutions can make intelligent assessments about whether an additional authentication factor is required—for example, based on known devices or locations—or they can offer a range of methods for supplying additional authentication, such as a laptop’s fingerprint scanner or an authorization URL sent via email. Such steps can improve the UX, drive adoption, and enhance security.
MFA can also help advance the move to passwordless authentication, for which other verification methods supersede passwords. This approach improves security by removing the vulnerable password and can enhance the UX by removing the need to manage different passwords and the burden of resetting them every few months.
Securing user access to systems is critical for an enterprise. Failing to do so can lead to significant security breaches, data loss, and subsequent negative business impact. MFA is a powerful tool that can help protect enterprise data. The UX has been considerably improved over the years, making it easier to adopt, and it’s capable of significantly reducing the risk of security breaches.
This GigaOm Key Criteria report details the criteria and evaluation metrics for selecting an effective MFA platform. The companion GigaOm Radar report identifies vendors and products that excel in those areas. Together, these reports provide an overview of the category and its underlying technology, identify leading MFA offerings, and help decision-makers evaluate these platforms so they can make a more informed investment decision.
How to Read this Report
This GigaOm report is one of a series of documents that helps IT organizations assess competing solutions in the context of well-defined features and criteria. For a fuller understanding, consider reviewing the following reports:
Key Criteria report: A detailed market sector analysis that assesses the impact that key product features and criteria have on top-line solution characteristics—such as scalability, performance, and TCO—that drive purchase decisions.
GigaOm Radar report: A forward-looking analysis that plots the relative value and progression of vendor solutions along multiple axes based on strategy and execution. The Radar report includes a breakdown of each vendor’s offering in the sector.
Solution Profile: An in-depth vendor analysis that builds on the framework developed in the Key Criteria and Radar reports to assess a company’s engagement within a technology sector. This analysis includes forward-looking guidance around both strategy and product.