Outsourcing, adieu: Companies retake the reins on IT services
After giving away the farm, some IT departments are bringing select outsourced services back in-house. Here's how they're doing it.
After giving away the farm, some IT departments are bringing select outsourced services back in-house. Here's how they're doing it.
This paper explores how enterprises can move beyond the password (something the user ‘knows’) to an intelligent authentication process that eliminates the risk of weak and vulnerable passwords. It works by cross-validating with other authentication methods like a physical item such as a token or smartphone (something the user ‘has’) and/or a personal attribute like a fingerprint or retina scan (something the user ‘is’). Two-factor (2FA) authentication and multifactor authentication (MFA) are now possible with intelligent authentication across corporate software, Cloud services and smart device apps.