Securing Mobile Apps in a Bring Your Own Device World

Posted by Naresh Persaud on Oracle Blogs See other posts from Oracle Blogs or by Naresh Persaud
Published on Tue, 5 Jun 2012 01:02:33 +0000 Indexed on 2012/06/05 4:45 UTC
Read the original article Hit count: 302

Filed under:
As more and more business users begin using their personal devices to access corporate information and resources, the number of network access requests has risen dramatically.  Access Management products and strategies that were based on an employee accessing network resources from a single desktop PC were never designed to monitor and manage an employee that is using a desktop and a laptop, a tablet, and a smartphone all from outside the corporate network, and possibly from an unsecured wireless public network.

A new approach is needed to manage the types and frequency of mobile app access requests - an integrated Platform Approach to Identity and Access Management that is location and device aware, that can warn you of unusual or high risk access.  A platform that provides standard APIs so you can manage your mobile apps the same way that you manage your enterprise apps.

View the slideshow below to see how the Oracle Identity Management platform can help you secure your mobile applications and data in a Bring Your Own Device World.

© Oracle Blogs or respective owner

Related posts about /Access Management