Key Authentication Considerations for Your Mobile Strategy

CA Technologies

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication


* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Jan 08, 2014
Length:  13
Type:  White Paper