• Data Sheet

Assure Multi-Factor Authentication

As stories of data breaches caused by exploited credentials continue to make headlines, it is clear that basic password protection mechanisms are no longer good enough. Organisations require an additional layer of protection that is also easy to use and doesn’t impose an additional burden on administrators.

Multi-factor authentication, also referred to as two-factor authentication, has become a popular method for strengthening security since it requires a user to provide more than one identifying factor prior to accessing a system, an application or its data. These factors can include something they know (user id, password, PIN), something they have (email account, smart phone, token device) or something they are (finger print, iris scan).

Assure Multi-Factor Authentication, a feature of Assure Security, improves the security of your IBM i system and core business applications. With Assure Multi-Factor Authentication you can:

  • Add an authentication layer beyond memorised or written passwords
  • Meet regulatory requirements and recommendations in PCI DSS 3.2, HIPAA, 23 NYCRR 500, Swift Alliance Access and others
  • Invoke rules-based multi-factor authentication only for users or specific situations that require it
  • Lower the risk of unauthorised access to systems, applications and data
  • Reduce the risk of data theft and its costs and consequences
  • Maintain an audit trail of multi-factor authentication failures for alerts, reports or integration with a SIEM solution
  • The use of Assure Multi-Factor Authentication can be expanded to support password self-service and the “four eyes principle” of supervised changes to sensitive data.

To learn more, download your copy of the full data sheet.

Share this resource:
LinkedIn
Facebook
X
WhatsApp
Email

Related posts

Automated, fast, accurate, sensitive data mapping & assessment as-a-service.
Given the increasing frequency of cyber attacks, it is essential to regularly conduct security risk assessments as part of a comprehensive IT security program.
The days when the IBM i was an isolated platform communicating through proprietary protocols are gone. Modern IBM i systems are highly connected through standard network and open-source protocols. This opens a wide variety of access points to the worldwide hacker community, who recognise the high value of data residing on an IBM i.
Having too many powerful user profiles leaves the security of your IBM i system and data exposed. In fact, security and compliance auditors prefer that IBM i users be given only the authorities required to perform their jobs, and that they be granted additional authority only when needed and only for the time required.