> Secure Computing > Securing Mobile Connectivity with Two-Factor Authentication

Securing Mobile Connectivity with Two-Factor Authentication

Published By: Secure Computing
Secure Computing
Published:  Jan 25, 2008
Length:  5 pages

Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.



Tagscell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access, wireless phones, productivity