X
Get all access to the world's best video surveillance information.
Logo
Free-book-promo-680-70

Multi-Factor Authentication Primer

Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting them to certain individuals. The technique of 'multi-factor authentication' is applied when the end-user is concerned about who actually can use access control credentials. In this note, we examine the concept and detail the ways many access control designers choose to use it.

Multi-Factor Authentication Defined


The complete update is available only to PRO Members.

Want to read the rest of Multi-Factor Authentication Primer and get immediate access?




Other Updates on Access Control

Electric Strikes: Why They Are So Popular on Jul 31, 2014
Electric strikes are a mainstay part of access control, but how often do integrators use them? In...

Access Control: Here's Why Integrators Choose Multiple Lines on Jul 28, 2014
With so many access options in the market, how many platforms do integrators typically sell? More...

Testing Bioscrypt's V-Flex Fingerprint Reader on Jul 25, 2014
With fingerprint readers available for as little as $100, why would you pay more? Consider Morpho...

Access Control Markups / Profits Revealed on Jul 23, 2014
How much profits do integrators typically make on access control projects? Is access one of the l...

Top 5 Access Control Problems on Jul 21, 2014
Here's what integrators say are their 5 top problems with electronic access control: High cost...

Favorite Access Control Credentials on Jul 11, 2014
When it comes to the most popular way to unlock a door, which access credential type holds the fa...

Maglocks - Who Uses And Hates Them on Jul 10, 2014
Many integrators hate maglocks. However, they are a common sight on many controlled openings. But...

New Hosted Access Provider: Feenics on Jul 08, 2014
There is a new entrant in the hosted access market, Feenics. Not only are they aiming for the cl...

Lifespan of Electronic Access Control Systems on Jul 01, 2014
Just how long do end users hang on to access systems before they look to change? The answer may s...

Average Access Control Job Size on Jun 30, 2014
Unique IPVM statistics reveal what is the average access control job size, how size varies across...


Most Recent Industry Updates

ADI's Price Match Guarantee Compared on Aug 01, 2014
Few policies are more powerful than "price matching." If a buyer sees a good deal elsewhere, the...

Michael Dell Invests in VSaaS Startup Eagle Eye on Aug 01, 2014
Only a month after Google bought Dropcam, Michael Dell is investing in VSaaS startup, Eagle Eye N...

'Sick', 'Greedy' Avigilon CFO Gets A New Job on Jul 31, 2014
Avigilon's explanations for their CFO crisis are falling apart but, in the meantime, it has worke...

Electric Strikes: Why They Are So Popular on Jul 31, 2014
Electric strikes are a mainstay part of access control, but how often do integrators use them? In...

Anixter Security Revenue Declines on Jul 30, 2014
Last quarter, we reviewed how Anixter's security business was struggling. Now, new financial resu...

VMS Webinar Series - Avigilon, NUUO, OnSSI, Network Optix on Jul 29, 2014
Over the next month, each Monday at 11am EDT / 15:00 GMT, IPVM will be hosting a webinar on a dif...

How Manufacturers Compete Against Low Cost on Jul 29, 2014
"I'll take whatever's cheapest" is perhaps the most hated phrase any salesman could hear. Yet hi...

Access Control: Here's Why Integrators Choose Multiple Lines on Jul 28, 2014
With so many access options in the market, how many platforms do integrators typically sell? More...

Testing Bioscrypt's V-Flex Fingerprint Reader on Jul 25, 2014
With fingerprint readers available for as little as $100, why would you pay more? Consider Morpho...

VSaaS Startup Pivots to Camera API Provider on Jul 24, 2014
This is a fascinating case study of how a VSaaS startup recognized the flaws in that market and a...