Hardware based two-factor authentication implementation

We are in the process of implementing hardware based two-factor authentication.  What does this mean?  Our staff will no longer use just passwords to access any data in our network.  They will need a hardware USB key to access servers, billing etc.  This added level of security will prevent brute force attacks and many other unauthorized ...