The 5 Ages of Mobile and the Security vs Usability Conundrum
The webinar explained the emergence of the SIM card as a universal possession factor for account registration and login. With cybersecurity becoming more vital in the age of hybrid work and BYOD (‘bring your own device’), how can IAM managers help prevent fraud without compromising user experience?
Using the benefits of both software and hardware security for a mobile device, SIM security is the new verification method that could change authentication for good.
See also: It's time to replace username and password with mobile number and SIM
Plus:
- The trade-offs of existing authentication factors – OTP, Push, WebAuthn, FIDO
- How to combine the benefits of software and hardware MFA
- The dozens of use cases for SIM-based authentication
- How SIM-based authentication works
Watch the replay
Click here to watch the webinar on demand. Supporting slides are available to download here.
Download PIN: 371829
Produced in partnership with

More by Simon Moffat on The Dot blog
- Opinion: Is Hardware MFA The Future?
- White paper: Five Steps Towards Improved MFA Adoption