How the Cloud Affects Authentication

Sarah Fender of PhoneFactor
The growth in cloud computing and mobility is creating a need for a streamlined, centralized process for managing user authentication, says Sarah Fender of PhoneFactor.

As more organizations enable remote access to core systems, they need to go beyond username and password to strengthen authentication, but they must keep the process simple, she says.

In an interview, Fender:

  • Describes how the explosion of cloud computing is affecting authentication;
  • Addresses how BYOD creates new risks that must be addressed;
  • Offers insights on managing authentication.

Fender is vice president at PhoneFactor, a unit of Microsoft. She joined the company in 2007 to lead the initial launch of the PhoneFactor service, and she continues to manage the product line. Prior to joining PhoneFactor, she held various executive leadership roles in marketing and operations at LaGarde, whose technology platform powered online operations for thousands of B2B and B2C clients.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.