• RSS
  • Twitter
  • FaceBook
Home > White Papers > CA Technologies > Key Authentication Considerations for Your Mobile Strategy

Key Authentication Considerations for Your Mobile Strategy

CA Technologies

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Email this page
Published:  Jan 08, 2014
Length:  13
Type:  White Paper
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, mobile computing, wireless security



Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter