Improve Security Posture
Provides a second layer of authentication to ensure the person is really the one whom claims to be.
How does it work?
Users can only access by providing something they know (password) together with something they have personally (mobile phone, hard token).
What are the benefits?
Eliminate the risk of malicious users accesing to business critical systems with stolen identities.