Properly identifying users through strong authentication methods is a critical component of an enterprise security architecture. Strengthened authentication methods are increasingly becoming a specified compliance requirement. The latest guidelines from the Payment Card Industry (PCI) and the Federal Financial Institutions Examiners Council (FFIEC) are two examples of these requirements. However, different use cases and different user requirements mean that you can’t take a “one size fits all” approach to deploying a strong authentication solution. Many enterprises commonly use several forms of two-factor authentication to serve the needs of customers, partners and various internal user populations This lab session will demonstrate the provisioning and deployment of various authentication credentials and methods available in Symantec’s Validation and Identity Protection (VIP) solution. You will see and be able to sample everything from hardware-based One Time Password (OTP) tokens, software tokens, mobile device credentials and various forms of risk-based authentication that are all deployable in the cloud-based Symantec VIP solution. You will experience first-hand how simple it is to manage, support and even automate the user experience of this enterprise-class offering.