Two-factor Authentication - Product Proliferation

Product Proliferation

Many TF-A products require users to deploy client software to make TFA systems work. Some vendors have created separate installation packages for network login, Web access credentials and VPN connection credentials. For such products, there may be four or five different software packages to push down to the client PC in order to make use of the token or smart card. This translates to four or five packages on which version control has to be performed, and four or five packages to check for conflicts with business applications. If access can be operated using web pages, it is possible to limit the overheads outlined above to a single application. With other TF-A solutions, such as virtual tokens and some hardware token products, no software must be installed by end users.

Read more about this topic:  Two-factor Authentication

Famous quotes containing the word product:

    For man is not the creature and product of Mechanism; but, in a far truer sense, its creator and producer.
    Thomas Carlyle (1795–1881)