Akamai MFA
FIDO2-based MFA solution using smartphone push notifications for authentication

Akamai MFA
FIDO2-based MFA solution using smartphone push notifications for authentication
Akamai MFA Description
Akamai MFA is a multi-factor authentication solution that secures workforce logins for cloud, web-based, on-premises, SaaS, and IaaS applications. The product leverages the FIDO2 standard for authentication security and converts smartphones into roaming FIDO2 authenticators through a mobile application, eliminating the need for physical hardware security keys. The solution provides phish-proof authentication by using FIDO2-based authentication factors that are resistant to common attack methods including SIM-hijacking, machine-in-the-middle replay, and push fatigue attacks. The FIDO2 implementation uses private/public key pairs where the private key remains stored in secure hardware on the authenticator and cannot be exported. Akamai MFA offers multiple authentication factors including FIDO2 phone security key, standard push notifications, one-time passwords (OTP), time-based one-time passwords (TOTP), SMS, and biometric factors such as facial recognition. The solution is cloud-based and includes self-service enrollment and device registration capabilities. The product integrates with identity provider and identity and access management solutions to provide a complete authentication solution. It automates user provisioning workflows to ensure changes in identity providers are immediately reflected. The solution includes reporting features for monitoring authentication events and can be combined with Zero Trust Network Access solutions.
Akamai MFA FAQ
Common questions about Akamai MFA including features, pricing, alternatives, and user reviews.
Akamai MFA is FIDO2-based MFA solution using smartphone push notifications for authentication developed by Akamai. It is a IAM solution designed to help security teams with Access Control, Authentication, Cloud Security.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox