On-demand Webinar

Advantages and Limitations of MFA: Exploring Common Bypass Techniques and Security Counter Measures

One of the most common identity security controls recommended is to implement MFA for at least those with access to valuable data…if not for absolutely everyone in the organization.

However, MFA most definitely isn’t a silver bullet. From simple social engineering methods like MFA prompt bombing or proxied logons – to advanced techniques designed to bypass MFA entirely – threat actors are finding ways to leverage compromised credentials despite organizations having MFA in place.

So, how is MFA being bypassed and what can you do about it?

In this webinar, we explore MFA’s promises, assumptions, and recent failings. Topics covered, include:

  • A look at MFA architecture and various practical ways MFA is implemented today
  • Different ways attackers bypass or avoid MFA protection
  • Controls to gain better visibility into attacker authentication
  • Various ways to improve the state of security around MFA
  • And more

We dared to push identity security further.

Discover what’s possible.

Set up a demo to see the Silverfort Identity Security Platform in action.