Best Practices for Authenticating Mobile Workers and Securing Data Access

Secure Computing

In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.

Tags : cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access


* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Jan 25, 2008
Length:  4
Type:  White Paper