MFA Blog

Multi-Factor Authentication technologies are constantly evolving to make life easier for security managers. Our blogs explore different MFA technologies and help to provide a unique insight into advanced configurations and usages to help organizations understand how they can tailor an MFA solution for their environment.

PIV standardization has made it much easier to secure a domain with smart cards, requiring only a few configuration steps without any additional software. The goal of this article is to show the configuration steps so corporations can understand what it takes and even test PIV cards in their environment
MFA Acceleration, PIV, Security Tips
Within only the past few years, the Multi-Factor Authentication (MFA) industry has made spectacular innovations that have started to integrate higher security into all of our daily transactions. The new advances in credential technologies have made cryptography (PKI), biometric and time-based authenticators mainstream and accessible by any consumer desiring them.
Enterprise Security, MFA Acceleration
For the past few months, there has been a buzz in the mobility, security and PIV communities concerning the new NIST standard for PIV derived credentials. As with any new technology, having a basic understanding can drastically help you decide the best way to harness the technology to improve security
Now that numerous enterprises have implemented corporate PIV cards (PIV-C) for multi-factor authentication needs, they want to get even more security from PIV by adding biometric components to their PIV cards. This blog will provide a guide for adding biometrics to an existing PIV-C issuance system as well guidance for
Now that enterprises have become comfortable with cryptographically secured hardware provided by PIV-C, they are looking for ways to add convenience and agility to their mobile device landscape while maintaining the same level of security controls that the PIV card provides…but without the physical card or reader. In this blog,
Copyright 2019 Cyber Armed Security, LLC. All Rights Reserved.

Pin It on Pinterest

Share This