Two-factor Authentication - Product Proliferation

Product Proliferation

Many TF-A products require users to deploy client software to make TFA systems work. Some vendors have created separate installation packages for network login, Web access credentials and VPN connection credentials. For such products, there may be four or five different software packages to push down to the client PC in order to make use of the token or smart card. This translates to four or five packages on which version control has to be performed, and four or five packages to check for conflicts with business applications. If access can be operated using web pages, it is possible to limit the overheads outlined above to a single application. With other TF-A solutions, such as virtual tokens and some hardware token products, no software must be installed by end users.

Read more about this topic:  Two-factor Authentication

Famous quotes containing the word product:

    Poetry is the only life got, the only work done, the only pure product and free labor of man, performed only when he has put all the world under his feet, and conquered the last of his foes.
    Henry David Thoreau (1817–1862)