This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Seeing the success of the Bring Your Own Device movement, a cadre of leading companies are starting to explore if a similar approach can be used to address the authentication challenge. If BYOD essentially makes the device a proxy for the work environment, can that same device serve as a proxy for customers online?
This new movement, known as Bring Your Own Authentication (BYOA), holds the same promise of reimagining the way we think of authentication, putting the consumer (and device) front and center in the interaction, and relegating passwords to the background or eliminating them completely. But there are challenges to overcome in order for mass adoption.
To read this article in full or to leave a comment, please click here
The struggle with automation is workflow.
The post Workflow ubiquity: why vendors are so bad at enabling automation – J-Net Community appeared first on EtherealMind.
Internet Society Chief Internet Technology Officer Olaf Kolkman will be speaking this week in both Washington, DC, and New York City on the Internet of Things (IoT), collaborative security, and our recent merger with the Online Trust Alliance. Two of the three events will be livestreamed and all have open registrations to attend in person.