Considering other access control methods

Use other access methods to augment your security software.