This Strategy Paper explores:

  • The rising threat of data breaches
  • How MFA was initially adopted
  • Increased momentum in MFA adoption due to smartphone usage
  • Advances in authentication solutions
  • Key considerations in choosing a MFA solution
  • How LinOTP meets these criteria