Security-conscious organizations and enterprises are finding it increasingly difficult to secure various mobile devices that flood corporate networks. With handheld devices heavily leveraged to access corporate networks and sensitive information, CIOs must consider their authentication strategies for any number of evolving channels.
I hosted a webcast July 13, for those seeking information on leveraging mobile devices with strong authentication. I tried to help organizations evaluate the many options and opportunities made possible by the increased reliance on mobile devices in the enterprise.
It was well received and I ended up taking many conversations offline………
I discussed topics such as:
-Case-by-case uses of Mobile phones as authenticator (as it varies organization to organization)
-RSA concerns, and how Entrust can help
-Our token replacement program