Research Library > CA Technologies > Key Authentication Considerations for Your Mobile Strategy

Key Authentication Considerations for Your Mobile Strategy

Published By: CA Technologies
CA Technologies
Published:  Jan 08, 2014
Length:  13 pages

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.



Tagsca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security