SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alcatraz achieves SOC 2 for biometric security
    • Datalogic AI tech drives retail innovation at NRF 2026
    • Deep Sentinel launches Mobile Monitoring Trailer
    • Eplan and CADENAS partnership enhances data access
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Why open matters in the age of AI
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

How does multi-factor authentication impact security?

1 Feb 2023

How does multi-factor authentication impact security?
Larry Anderson
Larry Anderson
1 Feb 2023

Editor Introduction

A multi-factor authentication is a layered approach that requires users to provide two or more verification factors, such as credentials, to gain access to data and applications. If one of the credentials is compromised, the thinking goes, an unauthorised user will still be unable to meet the second authentication requirement and will be denied access to a targeted physical space, computing device, network, or database. Cybersecurity applications have long embraced the idea of MFA, which is also now more common than ever in the physical security space. We asked this week’s Expert Panel Roundtable: How does multi-factor authentication impact the security marketplace?


Card image cap
Erron Spalsbury 3xLOGIC, Inc.

In today’s world, it seems we are constantly bombarded by phishing scams. If you mistakenly fall for one, someone can steal your information and gain access to sensitive data. This is why it is so important to use multi-factor authentication (MFA) anytime you log into a site with sensitive information. When accessing billing information, Social Security numbers, or even access to a camera system, the user needs to be validated from more than just one source. In our industry, unauthorised access to security systems can expose vital information, including the harvesting of password-protected sensitive video. By using MFA, the risk is significantly reduced by forcing the user to enter, at minimum, two forms of validation. A link that goes to a verified email or a code that is sent to a verified cell phone is among the required multiple steps that can effectively guard against a potential hacker.

Card image cap
John Davies TDSi

Multi-factor authentication (MFA) is already commonly used in areas such as e-commerce and online banking precisely because it offers a superior level of protection for particularly attractive areas to criminals. This equally applies to security and safety systems, of course, which also require the highest levels of assurance regarding authentication. Organisations are looking to further improve the security of physical access and that of their databases and systems to combat cyber and physical threats and protect vulnerabilities. Authentication is particularly under the spotlight. Using MFA through a combination of technologies such as tokens/cards, biometrics, and a password/code (something you have, something you are, and something you know) inevitably makes the job of cracking security far more difficult. It will obviously dissuade all but the most determined of intruders. As attacks become more sophisticated, we will likely see MFA deployment increasing rapidly.

Card image cap
Matthew Fabian Genetec, Inc.

Multifactor authentication (MFA) provides additional layers of security by requiring multiple authentication methods to verify a user's identity. It typically combines something the user knows, such as a password; something the user has, such as a hardware security token; and who the user is, such as biometric information. Additional factors such as location and time-based authentication can add more layers of protection and are often components of zero-trust architectures. These additional layers help prevent common social engineering attacks. When considering how to secure a facility, multi-factor authentication, biometrics, or even a PIN number, can prevent unauthorised access to a secure area. MFA should be a key component of any organization’s cybersecurity and physical security strategy. While it is still a relatively new concept in the physical security industry, demand for it is increasing as more interest is placed on the cybersecurity of physical security systems.

Card image cap
Eric Regnier ZAG Technical Services

Multi-factor authentication is not just for email accounts; it is also crucial for protecting physical assets across the enterprise. Any digital device or software solution that interfaces with the physical world to deliver physical security is dependent upon proper programming, configuration, and commands. Said another way, physical security solutions operate in the nexus between the physical and digital world and thus depend upon cybersecurity. As we have learned time and time again, MFA is a vital security control to prevent malicious exploitation of digital assets. It should be leveraged to the maximum extent possible within the organisation to secure its systems. Coupled with proper network segmentation, this is one of the best ways to protect the broader organisation from cyberattacks. 

Card image cap
Mike Kiser SailPoint

The past three years have seen the rapid adoption of remote working models and cloud-centric resources. Organisations rushed to deploy multi-factor authentication (MFA) to protect these resources, underscoring the new importance of identity to security strategy. While this new security maturity is welcome, not all MFA deployments are alike, and there is ample room for growth. Adoption may have caught on rapidly, but the industry has more work to do especially as new challenges stemming from the popularity of MFA itself. Once ubiquitous within the enterprise, users may be prompted to use MFA at every transaction leading to MFA fatigue. The ideal path forward is with an advanced MFA. Emerging standards such as Passkeys hold true potential for strong, biometric-supported authentication that can provide identity context for artificial intelligence and machine learning-based algorithms to make informed access decisions without prompting the use to deviate from their normal usage patterns.


Editor Summary

Requiring two different modes of identification or verification increases the level of security, including for physical security applications. More sophisticated access control systems, such as those incorporating artificial intelligence and biometrics, are streamlining processes that require multiple means of identification and verification, thus making it easier than ever to implement multi-factor authentication.

  • Related links
  • Genetec CCTV software
  • Genetec Access control software
  • TDSi Access control software
  • TDSi CCTV software
  • TDSi Electronic locking devices
  • TDSi Access control readers
  • Genetec Network video recorders (NVRs)
  • TDSi Access control cards/ tags/ fobs
  • TDSi Electronic keypads
  • TDSi Network video recorders (NVRs)
  • Related categories
  • Digital video recorders (DVRs)
  • CCTV software
  • Access control software
  • Access control readers
  • Electronic locking devices
  • Network video recorders (NVRs)
  • Access control cards/ tags/ fobs
  • Electronic keypads
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Explore multi-factor authentication's role in enhancing security measures and protecting sensitive data - improve your defence strategy today.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec