Mobile Authentication: Is This My App? Is This My User?
Strategy Deep Dive: The Mobile Security And Operations Playbook
December 5, 2012
Why Read This Report
Mobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to business services such as online banking, storefronts, as well as enterprise applications. Mobile authentication, as a fundamental enabling technology, permeates every aspect of mobile application operations, from registration, authorization, and updates, to the eventual deregistration. This report looks at the most important and mandatory mobile authentication design patterns, steps, and best practices, within the context of native mobile applications. We also provide a checklist of considerations to ensure that your mobile authentication strategy is complete.
Already a Client?
Log in to read this document.
Become a Forrester Client
Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Table of Contents
- S&R Pros, Come Out Of Your Caves And Embrace The Mobile Application
- Introducing Forrester's Mobile Application Authentication Life Cycle
- Minimize The Impact Of Mobile Authentication On Your Infrastructure
- Integrate Mobile Authentication With Cross-Channel Fraud
- Supplemental Material
- Related Research Documents
Mobile Application Authentication Trends And Best Practices
March 2, 2017 | Andras Cser
Build A Corporate App Store Into Your Workforce Computing Strategy
October 15, 2012 | Christian Kane
TechRadar™: Biometric Authentication, Q1 2017
March 14, 2017 | Andras Cser