HP Tc4200 HP ProtectTools: Authentication technologies and suitability to task - Page 8

Suitability to Task, Level of Security, Administrative Complexity

Page 8 highlights

Suitability to Task Each authentication device provides a tradeoff between ease of use, administrative complexity and level of security. The following graph visually represents where these devices fit in the administrative complexity versus level of security spectrum. More Secure Multi-Factor Authentication Level of Security Three factor (Biometric, Token and PIN) Hardware Token (Smartcard, USB) with PKI TPM Hardware Token (Smartcard USB) with Stored PIN Two factor (Biometric and Strong Password) Strong Password Biometric (Enterprise) Biometrics (Local) Weak Password Simple Administrative Complexity Complex Single-Factor Authentication Less Secure 8

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

Suitability to Task
Each authentication device provides a tradeoff between ease of use, administrative complexity and
level of security.
The following graph visually represents where these devices fit in the administrative
complexity versus level of security spectrum.
More Secure
Less Secure
Level of Security
Simple
Complex
Administrative Complexity
Weak Password
Biometrics (Local)
Biometric (Enterprise)
Hardware Token (Smartcard
USB) with Stored PIN
Hardware Token (Smartcard,
USB) with PKI
TPM
Two factor (Biometric and
Strong Password)
Three factor (Biometric,
Token and PIN)
Multi-Factor Authentication
Single-Factor Authentication
Strong Password
8