Abstract
Wouldn't you rather stop a security breach than detect it? So why do organizations have a love affair with intrusion detection systems and neglect strong authentication? While an IDS system can detect a breach, the authentication may stop it entirely. Numerous surveys done over the years have shown that passwords are the most common cause of information security breaches. Upgrading authentication may be the best investment you can make in enterprise security in terms of effectiveness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Michael Schwartz, Maciej Machulak
About this chapter
Cite this chapter
Schwartz, M., Machulak, M. (2018). Strong Authentication. In: Securing the Perimeter. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2601-8_7
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2601-8_7
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2600-1
Online ISBN: 978-1-4842-2601-8
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books