Skip to main content
> CA Technologies > Key Authentication Considerations for Your Mobile Strategy
 

Key Authentication Considerations for Your Mobile Strategy

White Paper Published By: CA Technologies
CA Technologies
Published:  Jan 15, 2014
Type:  White Paper
Length:  13 pages

Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy