Make sure it's turned on so that pingidentity.com can work properly.
Top 5 MFA Considerations Checklist
- LIST -
Top 5 MFA Considerations
Answer These Questions When Evaluating Multi-factor Authentication Solutions
Does it support flexible, risk-based step-up authentication?
Applying only the necessary amount of security depending upon the associated risk allows you to provide an optimal user experience, while controlling costs, improving fraud detection and creating an architecture that can flex to future demands.
Can it be extended with passive contextual authentication?
Utilizing passive user information—like geolocation, IP address, time of day and device identifiers—is the wave of the future. It provides better security and a better user experience, making it particularly suited to consumers.
How easy is it for your customers to use?
Providing a positive customer experience is key. Consider the limitations that your users may have, from non-smart phones to disabilities, as well as their potential resistance to new or invasive technologies.
How easy is it for your employees to use?
Employees can no longer be expected to go along with a less-than-optimal user experience, or one that is overly obtrusive. For customers and employees alike, be sure to balance usability with cost and security to increase adoption.
How can you mitigate the risk of opt-outs?
Having a choice of authentication methods—like voice, SMS and email—can mean the difference between adoption and abandonment. Anticipating objections is another important step in increasing adoption. Planning to maximize usability and flexibility will yield the best outcomes.
To learn more about MFA and how to successfully implement it, download our white paper.