How the Cloud Affects AuthenticationSarah Fender of PhoneFactor
As more organizations enable remote access to core systems, they need to go beyond username and password to strengthen authentication, but they must keep the process simple, she says.
In an interview, Fender:
- Describes how the explosion of cloud computing is affecting authentication;
- Addresses how BYOD creates new risks that must be addressed;
- Offers insights on managing authentication.
Fender is vice president at PhoneFactor, a unit of Microsoft. She joined the company in 2007 to lead the initial launch of the PhoneFactor service, and she continues to manage the product line. Prior to joining PhoneFactor, she held various executive leadership roles in marketing and operations at LaGarde, whose technology platform powered online operations for thousands of B2B and B2C clients.
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.