Singapore (Dec 3): The right choice of authentication methods must be dictated, on one hand, by security concerns, and on the other – by meeting users' expectations. But it’s the latter aspect that has recently started to play a key role.

In recent years, the percentage of people using mobile devices has increased dramatically. Tools, which until now have been used only for individual purposes, are now gaining ground in the professional setting. According to the Bring Your Own Device (BYOD) paradigm, companies have started to accept private mobile devices in the work environment. This gave rise to the challenge of providing secure access to company resources from private devices, over which the company seems to have no control at all.

That’s because business devices can be preconfigured, unambiguously identified by the MAC address, and equipped with an antivirus package or PKI-based certificates. Better yet, limits for the devices can be imposed as to installing additional software on them. With private equipment, such policy seems to be simply unattainable.

To continue reading,

Sign in to access this Premium article.

Subscription entitlements:

Less than $9 per month
3 Simultaneous logins across all devices
Unlimited access to latest and premium articles
Bonus unlimited access to online articles and virtual newspaper on The Edge Malaysia (single login)

Related Stories

Stay updated with Singapore corporate news stories for FREE

Follow our Telegram | Facebook