RSS feed Get our RSS feed

News by Topic

Best Practices for Authenticating Mobile Workers and Securing Data Access

Secure Computing

In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.

Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
 Email this page
Published:  Jan 25, 2008
Length:  4
Type:  White Paper