RSS feed Get our RSS feed

News by Topic

Key Authentication Considerations for Your Mobile Strategy

CA Technologies

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
 Email this page
Published:  Jan 15, 2014
Length:  13
Type:  White Paper