SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

How Does Multi-Factor Authentication Impact Security?

1 Feb 2023

How Does Multi-Factor Authentication Impact Security?
Larry Anderson
Larry Anderson
1 Feb 2023
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Multi-factor authentication enhances security by requiring multiple credentials for access.
  • Compromising one credential won't grant access due to a second authentication requirement.
  • MFA is increasingly common across cybersecurity and physical security markets.

Editor Introduction

A multi-factor authentication is a layered approach that requires users to provide two or more verification factors, such as credentials, to gain access to data and applications. If one of the credentials is compromised, the thinking goes, an unauthorized user will still be unable to meet the second authentication requirement and will be denied access to a targeted physical space, computing device, network, or database. Cybersecurity applications have long embraced the idea of MFA, which is also now more common than ever in the physical security space. We asked this week’s Expert Panel Roundtable: How does multi-factor authentication impact the security marketplace?


Card image cap
Erron Spalsbury 3xLOGIC, Inc.

In today’s world, it seems we are constantly bombarded by phishing scams. If you mistakenly fall for one, someone can steal your information and gain access to sensitive data. This is why it is so important to use multi-factor authentication (MFA) anytime you log into a site with sensitive information. When accessing billing information, Social Security numbers, or even access to a camera system, the user needs to be validated from more than just one source. In our industry, unauthorized access to security systems can expose vital information, including the harvesting of password-protected sensitive video. By using MFA, the risk is significantly reduced by forcing the user to enter, at minimum, two forms of validation. A link that goes to a verified email or a code that is sent to a verified cell phone is among the required multiple steps that can effectively guard against a potential hacker.

Card image cap
John Davies TDSi

Multi-factor authentication (MFA) is already commonly used in areas such as e-commerce and online banking precisely because it offers a superior level of protection for particularly attractive areas to criminals. This equally applies to security and safety systems, of course, which also require the highest levels of assurance regarding authentication. Organizations are looking to further improve the security of physical access and that of their databases and systems to combat cyber and physical threats and protect vulnerabilities. Authentication is particularly under the spotlight. Using MFA through a combination of technologies such as tokens/cards, biometrics, and a password/code (something you have, something you are, and something you know) inevitably makes the job of cracking security far more difficult. It will obviously dissuade all but the most determined of intruders. As attacks become more sophisticated, we will likely see MFA deployment increasing rapidly.

Card image cap
Matthew Fabian Genetec, Inc.

Multifactor authentication (MFA) provides additional layers of security by requiring multiple authentication methods to verify a user's identity. It typically combines something the user knows, such as a password; something the user has, such as a hardware security token; and who the user is, such as biometric information. Additional factors such as location and time-based authentication can add more layers of protection and are often components of zero-trust architectures. These additional layers help prevent common social engineering attacks. When considering how to secure a facility, multi-factor authentication, biometrics, or even a PIN number, can prevent unauthorized access to a secure area. MFA should be a key component of any organization’s cybersecurity and physical security strategy. While it is still a relatively new concept in the physical security industry, demand for it is increasing as more interest is placed on the cybersecurity of physical security systems.

Card image cap
Eric Regnier ZAG Technical Services

Multi-factor authentication is not just for email accounts; it is also crucial for protecting physical assets across the enterprise. Any digital device or software solution that interfaces with the physical world to deliver physical security is dependent upon proper programming, configuration, and commands. Said another way, physical security solutions operate in the nexus between the physical and digital world and thus depend upon cybersecurity. As we have learned time and time again, MFA is a vital security control to prevent malicious exploitation of digital assets. It should be leveraged to the maximum extent possible within the organization to secure its systems. Coupled with proper network segmentation, this is one of the best ways to protect the broader organization from cyberattacks. 

Card image cap
Mike Kiser SailPoint

The past three years have seen the rapid adoption of remote working models and cloud-centric resources. Organizations rushed to deploy multi-factor authentication (MFA) to protect these resources, underscoring the new importance of identity to security strategy. While this new security maturity is welcome, not all MFA deployments are alike, and there is ample room for growth. Adoption may have caught on rapidly, but the industry has more work to do especially as new challenges stemming from the popularity of MFA itself. Once ubiquitous within the enterprise, users may be prompted to use MFA at every transaction leading to MFA fatigue. The ideal path forward is with an advanced MFA. Emerging standards such as Passkeys hold true potential for strong, biometric-supported authentication that can provide identity context for artificial intelligence and machine learning-based algorithms to make informed access decisions without prompting the use to deviate from their normal usage patterns.


Editor Summary

Requiring two different modes of identification or verification increases the level of security, including for physical security applications. More sophisticated access control systems, such as those incorporating artificial intelligence and biometrics, are streamlining processes that require multiple means of identification and verification, thus making it easier than ever to implement multi-factor authentication.

  • Related links
  • Genetec Access control software
  • Genetec Video Surveillance software
  • TDSi Video Surveillance software
  • TDSi Access control software
  • TDSi Electronic lock systems
  • TDSi Access control readers
  • Genetec Network Video Recorders (NVRs)
  • TDSi Electronic keypads
  • TDSi Network Video Recorders (NVRs)
  • TDSi Access control cards/ tags/ fobs
  • Related categories
  • Digital video recorders (DVRs)
  • Video Surveillance software
  • Access control software
  • Access control readers
  • Electronic lock systems
  • Network Video Recorders (NVRs)
  • Access control cards/ tags/ fobs
  • Electronic keypads
Related white papers
The 4 Pillars Of AI In Managing High-Stakes Critical Events

The 4 Pillars Of AI In Managing High-Stakes Critical Events

Download
How Biometrics Are Reshaping Security In A Connected World

How Biometrics Are Reshaping Security In A Connected World

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
SentriGuard: Revolutionizing Key Management Solutions

SentriGuard: Revolutionizing Key Management Solutions

CrowdStrike 2025: Navigating The Threat Landscape

CrowdStrike 2025: Navigating The Threat Landscape

AI-Driven Security: HiveWatch's New Leadership

AI-Driven Security: HiveWatch's New Leadership

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Round table discussions
About this page

Discover multi-factor authentication benefits, enhance security measures, protect sensitive data, and prevent unauthorized access in organizations.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec