Authentication devices: Different tokens and their use cases

Authentication Devices

Cover

In today’s age of increasing threats and strict compliance demands, it’s critical to move beyond passwords to more secure authentication methods to ensure the person asking for access is who they say they are.

A popular method is the use of security tokens to provide a one-time passcode. These types of tokens generate random passcodes that cannot be re-used. End users gain access to resources by possession of the token and knowledge of a PIN number.

In this product selection guide, take a look at different types of authentication tokens to see which one is right for your organization.

Vendor:
HID Global
Posted:
09 Apr 2019
Published:
09 Apr 2019
Format:
PDF
Length:
8 Page(s)
Type:
Product Overview
Language:
English
Already a Bitpipe member? Login here

Download this Product Overview!