With the rapid adoption of cloud solutions and an ever-evolving threat landscape, single factor authentication solutions are no longer sufficient to secure access to online resources. According to Gartner, "By 2023, 60% of large and global enterprises, and 80% of MSEs, will deploy MFA capabilities consolidated with AM or similar tools, which is an increase from 10% and 25%, respectively, today.” But, eliminating passwords is not a straightforward task. There are numerous approaches and technologies for modernizing your user authentication strategy for both employees and customers.
In this guide, we believe Gartner provides a closer look at the user authentication market, including the vendors offering MFA solutions. With this resource, security and risk management leaders can make informed evaluations of MFA offering and select the technology that addresses their user experience, security, and implementation needs.
In this report, you will learn:
- Why continuous adaptive risk and trust assessment (CARTA) principles provide a resilient response to advanced threats and improve UX
- Clear distinctions between legacy 1+ factor authentication and true MFA solutions
- How cloud and the desire for mobile solutions influences the MFA market
Read this Gartner report now >>
Gartner, Market Guide for User Authentication, Ant Allan, Kaoru Yano, David Mahdi, Tricia Phillips, 26 June 2020
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.