
Are security tokens still relevant?The world of IT seems to like four-letter abbreviations: WLAN, SNMP, HTML – and the latest offering BYOD (Bring Your Own Device). Accessing corporate networks and data using private end terminals has, however, been an issue that has had many IT managers and managing directors scratching their heads. “How can we enable secure access for mobile devices without endangering our data?” One suitable approach is the use of a double layer of security which involves identifying users by means of tokenless two-factor authentication. This approach combines personal log in details, as the first factor, and a dynamic passcode received by smart phone, tablet or other mobile device, as the second.
- STEVE WATTS, CO-FOUNDER, SECURENVOY
- Viewpoints
- Posted On




