
Re-evaluate your MFA: Are You as Protected as You Should Be?
The dependency of MFA on either agents or proxies creates an inherent coverage problem.
Traditional MFA solutions rely on either installing agents on protected machines, or on placing a proxy in front of a group of machines in a network segment. Both approaches inherently entail coverage gaps.
Agents
As a rule of thumb agents can never be deployed across 100% of the machines in a given environment. The larger the environment is, the more chances that there will be machines out of the deployment scope. Additionally, there are always machines you cannot install agents on due to various reasons.
Proxies
Gaining full MFA coverage using proxies requires placing a proxy in front of each and every network segment without any blind spots. This makes it practically an impossible task whenever the network topology exceeds the most basic levels of size and complexity. The end result in both cases is partial coverage that leaves critical resources exposed to attack with compromised credentials without MFA protection.
MFA Challenge #1:
Relying on Agents & Proxies


Re-evaluate your MFA: Are You as Protected as You Should Be?

85%
Nullam placerat, nulla ac ultricies euismod, mauris lacus gravida leo, id convallis justo massa eu urna.
The dependency of MFA on either agents or proxies creates an inherent coverage problem.
Traditional MFA solutions rely on either installing agents on protected machines, or on placing a proxy in front of a group of machines in a network segment. Both approaches inherently entail coverage gaps.
Agents
As a rule of thumb agents can never be deployed across 100% of the machines in a given environment. The larger the environment is, the more chances that there will be machines out of the deployment scope. Additionally, there are always machines you cannot install agents on due to various reasons.
Proxies
Gaining full MFA coverage using proxies requires placing a proxy in front of each and every network segment without any blind spots. This makes it practically an impossible task whenever the network topology exceeds the most basic levels of size and complexity. The end result in both cases is partial coverage that leaves critical resources exposed to attack with compromised credentials without MFA protection.
MFA Challenge #1:
Relying on Agents & Proxies