X
Get all access to the world's best video surveillance information.
Logo
Free-book-promo-680-70

Multi-Factor Authentication Primer

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. The technique of 'multi-factor authentication' is applied when the end-user is concerned about who actually can use access control credentials. In this note, we examine the concept and detail the ways many access control designers choose to use it.

Multi-Factor Authentication Defined


The complete update is available only to PRO Members.

Want to read the rest of Multi-Factor Authentication Primer and get immediate access?




Other Updates on Access Control

WiFi & Wireless Access Lock Guide on Aug 25, 2014
When it comes to access control, any chance to save money on parts or install labor is attractive...

Hosted and Managed Access Control Statistics on Aug 19, 2014
'Cloud' access control - how many integrators are offering it? Why? And for those that do, are t...

Favorite Biometrics 2014 on Aug 18, 2014
This IPVM integrator survey reveals the favorite biometric of professional integrators, with stat...

Why Most Integrators Use the Same Techs for Video and Access on Aug 12, 2014
With so many differences between video surveillance and access control designs, how commonly do i...

Profitability: Access vs Video - Statistics on Aug 06, 2014
Where do integrators make more money? Access control or video surveillance? With both systems b...

Electric Strikes: Why They Are So Popular on Jul 31, 2014
Electric strikes are a mainstay part of access control, but how often do integrators use them? In...

Access Control: Here's Why Integrators Choose Multiple Lines on Jul 28, 2014
With so many access options in the market, how many platforms do integrators typically sell? More...

Testing Bioscrypt's V-Flex Fingerprint Reader on Jul 25, 2014
With fingerprint readers available for as little as $100, why would you pay more? Consider Morpho...

Access Control Markups / Profits Revealed on Jul 23, 2014
How much profits do integrators typically make on access control projects? Is access one of the l...

Top 5 Access Control Problems on Jul 21, 2014
Here's what integrators say are their 5 top problems with electronic access control: High cost...


Most Recent Industry Updates

Startup: Smoke Detector As a Security System on Aug 28, 2014
Fresh off a successful fundraising campaign, Novi Security is making some bold claims: Its securi...

Mobotix Admits Channel Stuffing on Aug 27, 2014
Channel stuffing is becoming an important industry issue. First, there with an analyst firm's al...

Technician Job Notes Done Right on Aug 27, 2014
One of the most common complaints of senior integrators is poor job notes. Service technicians, ...

Lenel OnGuard Live Webinar on Aug 26, 2014
On Monday September 8th at 11am EDT, IPVM will host a webinar on Lenel OnGuard, doing a live revi...

Startup Review: Sentri on Aug 26, 2014
This security startup smashed through their goal in 48 hours and have raised nearly $400,000 tota...

The Bloody HD Camera Wars Are Coming on Aug 25, 2014
The most important emerging trend in video surveillance today is the emergence of non-IP HD camer...

WiFi & Wireless Access Lock Guide on Aug 25, 2014
When it comes to access control, any chance to save money on parts or install labor is attractive...

Field of View (FoV) Tutorial on Aug 24, 2014
Field of View, or FoV, is deceptively complex. At its most basic, it is simply what the camera ca...

Startup: Smart Security Padlock on Aug 22, 2014
Want to eliminate using keys or combinations? Replace them with your smartphone to control access...

Elevator Surveillance Guide on Aug 21, 2014
Installing surveillance in an elevator can be challenging. Small but wide areas, vandal resistanc...