One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 358423
Date de publication 2017-04-24 07:37:00 (vue: 2017-04-24 07:37:00)
Titre Bring Your Own Authentication is upending online security practices
Texte This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.Seeing the success of the Bring Your Own Device movement, a cadre of leading companies are starting to explore if a similar approach can be used to address the authentication challenge. If BYOD essentially makes the device a proxy for the work environment, can that same device serve as a proxy for customers online?This new movement, known as Bring Your Own Authentication (BYOA), holds the same promise of reimagining the way we think of authentication, putting the consumer (and device) front and center in the interaction, and relegating passwords to the background or eliminating them completely. But there are challenges to overcome in order for mass adoption.To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat address adoption approach are article authentication background beenâ edited bring but butâ readers byoa byod cadre can center challenge challenges click comment companies completely consumer customers device eliminate eliminating environment essentially explore favor front full here holds interaction known leading leave likely makes mass movement network new note online order overcome own passwords please practices primerâ has product promise promotion proxy putting read reimagining relegating same security seeing serve should similar starting submitter success tech them think upending used vendor way will work world written your
Tags Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: