When it comes to securing digital personal data, using a simple password is no longer secure enough, especially when it comes to sensitive areas such as banking, insurance or health data. Strong authentication, i.e. a second factor, is needed to secure access. 

There are many methods of strong authentication. Making the right choice is not always easy and is like looking for a needle in a haystack.
The selection criteria range from security, user-friendliness and costs to legal requirements.

It is therefore important to ask yourself a few questions in advance regarding the requirements of a possible solution.

How important is usability?
Here it is always important to consider that security that is not very user-friendly is usually bypassed. In other words, giving users more convenience also means more security. If the 2FA solution is primarily used by customers and partners, the user experience has the highest priority.

Do users log in frequently or rather occasionally?
In both cases, the user-friendliness of the method used is crucial. For some, so that they do not have to log in several times a day. For the others, because login steps that need to be carried out can be forgotten if they are used infrequently, resulting in unnecessary helpdesk enquiries.

Can a smartphone be used?
The smartphone offers many advantages for strong authentication: no additional devices, availability at any time, low administrative effort, etc.
But will the solution be accepted by the users?

It is also important whether Customer Identity & Access Management (cIAM) is already in use, for how many users the solution is needed, who the target groups are, etc.

The list of questions that should be asked can be extended indefinitely.
In order not to forget any of the crucial questions, we have compiled an online questionnaire for you with 13 questions and supplemented it with recommendations from experts. After completing the questionnaire, you will receive an e-mail with an evaluation of the information you have provided, in which we will specifically recommend suitable methods.

What are you waiting for? Start now and get the information you need for your optimal second factor.

Fill out questionnaire

Blognews directly in your mailbox

The Airlock Newsletter informs you continuously about new blog articles.

Subscribe blognews

Information for you

-Our whitepapers-

Study Application and API Security 2022

In a recent study in cooperation with CIO, CSO and COMPUTERWOCHE, Ergon Airlock looked at application and API security in the container environment.

Request study

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge