> White Papers > CA Technologies > Key Authentication Considerations for Your Mobile Strategy
 

Key Authentication Considerations for Your Mobile Strategy

CA Technologies

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management


* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Jan 15, 2014
Length:  13
Type:  White Paper