Expert opinion


Two-factor authentication (2FA) is considered a central component of modern IT security. But what does implementation look like in practice? What challenges arise – and what should you pay attention to when selecting and implementing it?
In “Expert opinion”, two IT security experts have their say, shedding light on the topic from a professional perspective. In this interview, they talk about current threats, sensible protective measures and make specific recommendations for those who want to better secure their access points.
See for yourself what really matters with 2FA.


You are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information
You are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information
You are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information
You are currently viewing a placeholder content from Facebook. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information