{{search ? 'Close' : 'Search'}}

Mobile Authentication: Key Considerations for Developing Your Strategy

Published: 2 Apr 2014

Mobile devices are ubiquitous and end users tend to keep them close at hand. This makes them a viable option as an authentication credential device and for out-of-band authentication methods. The growing use of mobile devices for access to Web-based or native mobile applications introduces many new risks and fraud opportunities, including those related to BYOD and privacy.

Join us for this webinar, where David Gormley, Sr. Principal, Security Solutions from CA Technologies will discuss prevalent use cases and highlight key considerations to assist you for planning your mobile authentication strategy.