HIT Consultant Insightful coverage of healthcare innovation
> Secure Computing > Securing Mobile Connectivity with Two-Factor Authentication
 

Securing Mobile Connectivity with Two-Factor Authentication

White Paper Published By: Secure Computing
Secure Computing
Published:  Jan 25, 2008
Type:  White Paper
Length:  5 pages

Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.



Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access