Password leaks, successful phishing attacks and compromised end user machines are the daily reality in today’s IT security landscape. This means that the “traditional” way of authentication, which...