SHARE’D KNOWLEDGE

Selecting the Best Option to Deploy MFA to Secure Your Z environment

Product not yet rated

Recorded On: 08/22/2022

80% of hackers say humans are most responsible for security breaches, and 68% of hackers say MFA is one of their biggest obstacles. How can organizations ensure that the MFA solution they deploy is most compatible with their infrastructure and enterprise security management goals? The considerations go beyond support for security managers, such as RACF, Top Secret, or XYZ, and leading authentication methods such as RSA SecurID and Certificate Authentication? In this session, the speaker discusses a "pre-flight checklist" of sorts that ever security architect and administrator should have on-hand to ensure they make the most pragmatic choice tailored to their organization.

James Porell (Director), IBM Corporation