Source |
Network World |
Identifiant |
358423 |
Date de publication |
2017-04-24 07:37:00 (vue: 2017-04-24 07:37:00) |
Titre |
Bring Your Own Authentication is upending online security practices |
Texte |
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.Seeing the success of the Bring Your Own Device movement, a cadre of leading companies are starting to explore if a similar approach can be used to address the authentication challenge. If BYOD essentially makes the device a proxy for the work environment, can that same device serve as a proxy for customers online?This new movement, known as Bring Your Own Authentication (BYOA), holds the same promise of reimagining the way we think of authentication, putting the consumer (and device) front and center in the interaction, and relegating passwords to the background or eliminating them completely. But there are challenges to overcome in order for mass adoption.To read this article in full or to leave a comment, please click here |
Envoyé |
Oui |
Condensat |
address adoption approach are article authentication background beenâ edited bring but butâ readers byoa byod cadre can center challenge challenges click comment companies completely consumer customers device eliminate eliminating environment essentially explore favor front full here holds interaction known leading leave likely makes mass movement network new note online order overcome own passwords please practices primerâ has product promise promotion proxy putting read reimagining relegating same security seeing serve should similar starting submitter success tech them think upending used vendor way will work world written your |
Tags |
Guideline
|
Stories |
|
Notes |
|
Move |
|