article thumbnail

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Perficient

This time we’ll take things a step further and show you how to restrict specific activities like cut/copy, paste, and printing! PII: Social Security Numbers) or custom expressions. For our use case, we’re going to select one of the preset expressions and choose US: PII: Social Security Number. . End-user experience.

How To 520
article thumbnail

How to control sensitive data on unmanaged devices with MCAS

Perficient

In today’s blog, I’ll show you how you can block downloading of files with sensitive data to unmanaged devices with the use of session policies in Microsoft Cloud App Security (MCAS). Controlling End-Users using Sensitive Data on Unmanaged Devices. Let’s say we have a user, Megan B. End-user experience.

Data 520
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Streamline the User Experience with Mobile Carrier Data

ZootBlog

This norm of using mobile devices to do everything from shopping to banking, mean security and a great user experience need to go hand-in-hand. That is a staggering statistic clearly pointing to a poor user experience. A streamlined user experience that eliminates typing and scrolling is essential.

article thumbnail

Secure Payments, Generation 2.0

PYMNTS

Enter 3-D Secure 2.0. In a webinar with James Rendell, vice president of payment security at CA Technologies, and Paul Baker, vice president/senior business leader of enterprise security solutions at Mastercard, PYMNTS’ Karen Webster delved into just how 3-D Secure 2.0 It’s ubiquitous. It could mean anything.

Security 190
article thumbnail

Deep Dive: How FIs Can Secure Mobile Onboarding Without Adding Frictions

PYMNTS

This has increased the need for FIs to develop convenient mobile onboarding experiences, but those that lack confidence in their ability to secure such channels appear to be reluctant to offer them. Getting the mobile experience right can be tricky, however, and various inconveniences have impeded usersexperiences for years.

Mobile 130
article thumbnail

How The Z-Wave Alliance Is Balancing IoT Interoperability And Security

PYMNTS

This presents problems for developers, who need to make sure that their products run both smoothly and securely. Developers keen on addressing these concerns must carefully consider how to design and connect their devices to provide reliable, secure performance. How Z-Wave works . The three mandates .

Security 142
article thumbnail

Password Security. An End of an Error.

PYMNTS

Overview: Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and Karen Webster, CEO, Market Platform Dynamics, on Thursday, March 30th, at 1:00 PM (EST), to learn how authentication is evolving; how it could transform your security and user experience; and how you can tackle the choices and consequences.

Security 100