Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies

Join Dale Tesch, director at Integralis and Gil Friedrich, vice president of technology at ForeScout Technologies
Bring Your Own Device (BYOD) is a disruptive trend in IT and security management. Organizations are seeking to enable personal mobile device use at the workplace without compromising security. This timely webcast covers the fundamentals, policies and technologies that can enable fluid yet policy-based control for users and their smartphones and tablets to access network resources and sensitive information.

Topics include:
- risk assessment
- policy design
- NAC
- MDM
- how to tier services

Speaker bios:

DaleTesch, director professional services & global NAC practice leader at Integralis, brings over 11 years of Networking & Security experience repre-senting Manufacturers, Managed Service Providers, and Integrators to For-tune 500 companies. Through proven leadership he successfully has built and deployed several network security professional services organizations with results which have been publicly acknowledged through industry reviews and awards.

Gil Friedrich, vice president of technology at ForeScout Technologies, brings over 15 years of managerial and technical experience in developing networking software. Gil holds a M.Sc. in Computer Science from Tel-Aviv University (Cum Laude) and a B.Sc. in Physics and Computer Science from Tel-Aviv University (Cum Laude).
May 31 2012
64 mins
Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies
More from this community:

Business Intelligence and Analytics

  • Live and recorded (1533)
  • Upcoming (41)
  • Date
  • Rating
  • Views
  • Hadoop is transforming today's Healthcare industry. In this webinar, Charles Boicey covers the various new use cases made possible as the Hadoop ecosystem matures.​

    In 2010 the Clinical Informatics Team at the University of California in Irvine, led by Charles Boicey, looked outside of the conventional Healthcare data ecosystem for new data management solutions - their existing Electronic Health Record and Enterprise Data Warehouse environments no longer met the organization’s needs. They researched "Big Data" technologies in organizations such as Yahoo, LinkedIn, Twitter, and Facebook and concluded that Hadoop could supplement their current ecosystem to solve existing use cases and act as a platform to develop new applications for future solutions and insights.
  • YARN has fundamentally transformed the Hadoop landscape. It has opened Hadoop from a single workload system to one that can now support a multitude of “fit for purpose” processing. In this workshop we will provide an overview of Apache Slider that enables custom applications to run natively in the cluster as a YARN Ready Application. The workshop will include working examples and provide an overview of work being pursued in the community around YARN Docker integration.
  • Effective data governance requires the effective application of people, process, policy and technology to ensure consistent delivery of trusted, connected, and secure data across an enterprise.

    Organizations across all industries are investing in data governance to gain business value from their data to meet industry regulations, reduce the cost of doing business, and grow revenue and profits.

    In this webinar dedicated to data governance, Michael Wodzinski, Director of Information Architecture team, Lisa Bemis, Director of Master Data, and Fabian Torres, Director, Project Management at Houghton Mifflin Harcourt (HMH), global leader in publishing, will share their experiences in implementing a data governance program within HMH. Our guest speakers from HMH will discuss some of the unique data management challenges within HMH, how the data governance program has helped address those issues and open up new opportunities for the company. While walking you through their data governance journey, our guest speakers will offer their insights on how to establish a viable data governance practice in a complex enterprise environment, share their best practices and lessons learned. David Lyle, VP of Produce Strategy, from Informatica will share his observations in the data governance space, discuss Informatica’s data governance solutions and our thought leadership behind those offerings.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Growing installs is the number one mission for any mobile app developer, and any user acquisition strategy generally consists of a mix of organic installs and paid campaigns. But many see these as separate and distinct. Not true. To get the most out of each — especially for smaller developers — it’s critical to understand how paid installs impact organic installs, and vice versa.

    In this webinar, Ian Sefferman of TUNE will share the eye-opening results of a study investigating the correlation between paid campaigns and organic installs (yes, it’s positive), and how this varies depending on the app category and operating system. Christian Calderon of DOTS will dive into the strategies and tactics that increase both paid and organic installs, and how they work together.

    What you’ll learn:
    For every paid install, how many organic installs an app can expect to see
    How the multiplier effect impacts app categories differently
    How organic installs and engaged users affect your paid strategy and spend
    Best-practice examples on what really works to maximize both organic installs and paid campaigns for highest yield

    #paidorganic
    #appmktg

    Speakers:
    Ian Sefferman, GM, App Store Analytics
    Christian Calderon, Head of Marketing, DOTS
  • Based on recent research by analyst Bob Larrivee of AIIM, this webinar will address how organizations can leverage technology to identify, evaluate and optimize business processes to increase operational efficiency.

    Join us as we explore:
    - Drivers for problem-solving, tracking KPIs, process failures and workflow management
    - How technology can reduce errors and exceptions that lead to lost business and non-compliance
    - Increasing visibility to optimize processes, reduce costs and deliver a superior customer experience
  • Scaling multiple databases with a single legacy storage system works well from a cost perspective, but workload conflicts and hardware contention make these solutions an unattractive choice for anything but low-performance applications.

    Attend the webinar to learn about:
    - How SolidFire’s all-flash storage system provides high performance at massive scale for mixed workload processing while simultaneously controlling costs and guaranteeing performance
    - How to deploy four or more database copies using SolidFire’s Oracle Validated Configuration, at a price point at or below the cost of traditional storage systems
    - SolidFire’s Quality of Service (QoS) guarantee; every copy receives dedicated all-flash performance, so IT admins can deliver solutions with confidence and maximize business efficiency
  • Scaling multiple databases with a single legacy storage system works well from a cost perspective, but workload conflicts and hardware contention make these solutions an unattractive choice for anything but low-performance applications.

    Attend the webinar to learn about:
    - How SolidFire’s all-flash storage system provides high performance at massive scale for mixed workload processing while simultaneously controlling costs and guaranteeing performance
    - How to deploy four or more database copies using SolidFire’s Oracle Validated Configuration, at a price point at or below the cost of traditional storage systems
    - SolidFire’s Quality of Service (QoS) guarantee; every copy receives dedicated all-flash performance, so IT admins can deliver solutions with confidence and maximize business efficiency
  • In data visualization, we map data values and relationships onto visual dimensions to create a graphical representation for exploration and analysis. How can we best use the power of the human visual system to make these values and relationships clear? Using examples from information design, cartography and data graphics, we will demonstrate how insights from research in color perception, perceptual organization and visual attention have helped define best practices for visual analysis.

    You will learn how to utilize a few perceptual and cognitive building blocks that can inform a wide variety of visualization choices, and to demonstrate how these influenced the design of the Tableau product.
  • In data visualization, we map data values and relationships onto visual dimensions to create a graphical representation for exploration and analysis. How can we best use the power of the human visual system to make these values and relationships clear? Using examples from information design, cartography and data graphics, we will demonstrate how insights from research in color perception, perceptual organization and visual attention have helped define best practices for visual analysis.

    You will learn how to utilize a few perceptual and cognitive building blocks that can inform a wide variety of visualization choices, and to demonstrate how these influenced the design of the Tableau product.
  • Channel
  • Channel profile
  • Top 10 BYOD Tips: Managing Flexibility and Security Recorded: Apr 24 2013 51 mins
    BYOD poses tremendous security challenges for today’s IT departments. Allowing users to reap personal productivity benefits while maintaining high network security is an increasingly critical issue. This webinar will present ten best practices for planning and implementing a BYOD program that meets the needs of users and the organization.

    Topics covered include:

    •Top benefits and pitfalls of BYOD programs
    •How to plan your BYOD strategy
    •Tips to ensure program success
    •Choosing a security strategy for your network, devices and data
    •Selecting security products
    •Integrating NAC with MDM
    •Case study that demonstrates how a large U.S. bank rolled out a highly successful BYOD program
  • Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies Recorded: May 31 2012 64 mins
    Bring Your Own Device (BYOD) is a disruptive trend in IT and security management. Organizations are seeking to enable personal mobile device use at the workplace without compromising security. This timely webcast covers the fundamentals, policies and technologies that can enable fluid yet policy-based control for users and their smartphones and tablets to access network resources and sensitive information.

    Topics include:
    - risk assessment
    - policy design
    - NAC
    - MDM
    - how to tier services

    Speaker bios:

    DaleTesch, director professional services & global NAC practice leader at Integralis, brings over 11 years of Networking & Security experience repre-senting Manufacturers, Managed Service Providers, and Integrators to For-tune 500 companies. Through proven leadership he successfully has built and deployed several network security professional services organizations with results which have been publicly acknowledged through industry reviews and awards.

    Gil Friedrich, vice president of technology at ForeScout Technologies, brings over 15 years of managerial and technical experience in developing networking software. Gil holds a M.Sc. in Computer Science from Tel-Aviv University (Cum Laude) and a B.Sc. in Physics and Computer Science from Tel-Aviv University (Cum Laude).
Mobile Security and Bring Your Own Device
ForeScout's mobile security and bring your own device (BYOD) channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies
  • Live at: May 31 2012 5:00 pm
  • Presented by: Join Dale Tesch, director at Integralis and Gil Friedrich, vice president of technology at ForeScout Technologies
  • From:
Your email has been sent.
or close
You must be logged in to email this