Trends Report

Mobile Authentication: Is This My App? Is This My User?

Strategy Deep Dive: The Mobile Security And Operations Playbook

December 5th, 2012
Chenxi Wang, null
Chenxi Wang
With contributors:
Stephanie Balaouras , Eve Maler , Thayer Frechette

Summary

Mobile devices are everywhere: at work, in the hands of your customers, and with employees. Security and risk (S&R) professionals need to provide users with secure and seamless mobile access to business services such as online banking, storefronts, as well as enterprise applications. Mobile authentication, as a fundamental enabling technology, permeates every aspect of mobile application operations, from registration, authorization, and updates, to the eventual deregistration. This report looks at the most important and mandatory mobile authentication design patterns, steps, and best practices, within the context of native mobile applications. We also provide a checklist of considerations to ensure that your mobile authentication strategy is complete.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.