> White Papers > CA Technologies > Key Authentication Considerations for Your Mobile Strategy

Key Authentication Considerations for Your Mobile Strategy

CA Technologies

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.

Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device

* Please enter your email address and click the Download Now button to download the white paper.

 Email this page
Published:  Jan 08, 2014
Length:  13
Type:  White Paper