“We're giving the user the convenience of a soft token with the security and hardening of a hardware token.”
Hackers are learning the two-step, but they struggle to crack hardware
Many enterprises have already transitioned to a two-step authentication process in response to this growing issue. That’s certainly a smart move, but even the best two-step authentication protocols can be vulnerable when they rely on software alone. Software is inherently hackable, and if intruders can break through the code of one authentication factor, they can probably crack through a second. And if not, they change the IT policy or circumvent the token representing the authentication decision.
Some businesses are now relying on key fobs or other physical tokens as a secondary form of authentication to overcome the weaknesses of software-only security. While this is more secure, it’s also cumbersome, as these tokens can be lost, broken, or stolen. A better solution is one that incorporates authentication into the hardware itself.
True multifactor authentication (MFA) needs to be built into the hardware to effectively combat breaches. Grounding security in the silicon processes of the hardware provides a hardened layer of protection that’s much more difficult to hack than software alone—and does so without the added burden of requiring employees to carry physical tokens. Fortunately for today’s enterprises, 7th Gen Intel® Core™ vPro™ processor-based devices feature this kind of hardware-enhanced security right out of the box.
With the built-in Intel® Authenticate Solution, these devices are designed to prevent intrusions thanks to MFA that’s rooted in the hardware. And with a wide variety of authentication factors and security options to choose from, businesses can tailor their solution to specific needs with greater precision.
“The Intel® Authenticate Solution gives businesses the flexibility to choose type of factors, when to apply location, apply per groups, per user, per device, per situation, and change protocols when something goes wrong,” said Yasser Rasheed, director of business client security at Intel. “And on top of that, they have the ability to control all of this remotely.”