Existing commercially available two factor authentication software packages and authorization software packages
For each package analyze the strengths, weaknesses, economics (i.e. cost and licensing), and the Information Technology environment(s) in which each can operate