Link Details

Link 1065551 thumbnail
User 1193033 avatar

By JeanROCHER
via inwebo.com
Published: Nov 15 2013 / 04:40

Traditional boundaries belong to the Past. Whether you like it or not, new devices (tablets, smartphones...) are being used every day to access your IT systems, including business-critical applications. With the Cloud, IT assets themselves are rapidly moving outside of the VPN orbit. Securing multiple device access to your IT assets (CRM, messaging system, EDM, business apps...) is has become a critical component of the IT value-chain. Unfortunately, classical authentication mechanisms, such as tokens, cannot respond to the new challenges: Must be super easy to use, super easy to deploy, cost-effective, and align authentication with your IAM policies.
  • 8
  • 0
  • 594
  • 563

Comments

Add your comment
User 1111281 avatar

soham_roy replied ago:

1 votes Vote down Vote up Reply

I particularly find the concept of Single Sign-On across applications and devices a little uncomfortable. We users aren't confined to the boundaries of a personal computer. With the advent of Tabs and Smartphones , the sharing of single password to access multiple systems across Computers , Tablets and S.P can lead to authentication risks.

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Voters For This Link (8)



Voters Against This Link (0)



    Apache Hadoop
    Written by: Piotr Krewski
    Featured Refcardz: Top Refcardz:
    1. Play
    2. Akka
    3. Design Patterns
    4. OO JS
    5. Cont. Delivery
    1. Play
    2. Java Performance
    3. Akka
    4. REST
    5. Java