Singapore (Dec 3): The right choice of authentication methods must be dictated, on one hand, by security concerns, and on the other – by meeting users' expectations. But it’s the latter aspect that has recently started to play a key role.

In recent years, the percentage of people using mobile devices has increased dramatically. Tools, which until now have been used only for individual purposes, are now gaining ground in the professional setting. According to the Bring Your Own Device (BYOD) paradigm, companies have started to accept private mobile devices in the work environment. This gave rise to the challenge of providing secure access to company resources from private devices, over which the company seems to have no control at all.

Have a premium account? Sign in to continue reading.

Unlimited access to all stories from $99.9/year*

The latest reporting and analysis from business and investments to news and views on social issues.

Bonus:

  • Simultaneous logins across all devices
  • Instant access to past digital issues
  • Unlimited access to The Edge Malaysia
  • *For annual subscription plan only. T&Cs apply

Subscribe

Stay updated with Singapore corporate news stories for FREE

Follow our Telegram | Facebook