Link Details

Traditional boundaries belong to the Past. Whether you like it or not, new devices (tablets, smartphones...) are being used every day to access your IT systems, including business-critical applications. With the Cloud, IT assets themselves are rapidly moving outside of the VPN orbit. Securing multiple device access to your IT assets (CRM, messaging system, EDM, business apps...) is has become a critical component of the IT value-chain. Unfortunately, classical authentication mechanisms, such as tokens, cannot respond to the new challenges: Must be super easy to use, super easy to deploy, cost-effective, and align authentication with your IAM policies.

Posted by JeanROCHER  |   Nov 15 2013 / 04:40

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Comments

User 1111281 avatar

soham_roy replied ago:

I particularly find the concept of Single Sign-On across applications and devices a little uncomfortable. We users aren't confined to the boundaries of a personal computer. With the advent of Tabs and Smartphones , the sharing of single password to access multiple systems across Computers , Tablets and S.P can lead to authentication risks.

Reply 1 votes

Recommended Links

Scala
Written by: Ryan Knight
Featured Refcardz: Top Refcardz:
  1. Apache Hadoop
  2. Play
  3. Akka
  4. Debugging JavaScript
  5. Design Patterns
  1. Apache Hadoop
  2. REST
  3. Java
  4. Git
  5. Java Performance
Connect with DZone