Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies

Join Dale Tesch, director at Integralis and Gil Friedrich, vice president of technology at ForeScout Technologies
Bring Your Own Device (BYOD) is a disruptive trend in IT and security management. Organizations are seeking to enable personal mobile device use at the workplace without compromising security. This timely webcast covers the fundamentals, policies and technologies that can enable fluid yet policy-based control for users and their smartphones and tablets to access network resources and sensitive information.

Topics include:
- risk assessment
- policy design
- NAC
- MDM
- how to tier services

Speaker bios:

DaleTesch, director professional services & global NAC practice leader at Integralis, brings over 11 years of Networking & Security experience repre-senting Manufacturers, Managed Service Providers, and Integrators to For-tune 500 companies. Through proven leadership he successfully has built and deployed several network security professional services organizations with results which have been publicly acknowledged through industry reviews and awards.

Gil Friedrich, vice president of technology at ForeScout Technologies, brings over 15 years of managerial and technical experience in developing networking software. Gil holds a M.Sc. in Computer Science from Tel-Aviv University (Cum Laude) and a B.Sc. in Physics and Computer Science from Tel-Aviv University (Cum Laude).
May 31 2012
64 mins
Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies
Join us for this summit:
More from this community:

Business Intelligence and Analytics

Webinars and videos

  • Live and recorded (1028)
  • Upcoming (34)
  • Date
  • Rating
  • Views
  • In this 60-minute webinar we will kick-off our Consistent Customer Experience webinar series. We will clearly identify the elements that define the customer experience and will explore why delivering a consistent experience is critical for your brand and bottom line. We’ll outline the processes, tools and technology that enable retailers to deliver their vision for their customers.

    Sessions will take attendees through the entire process of optimizing the customer experience, including strategies around: payroll, labor allocation, communication, space optimization and data analytics. Each presentation also will include an inside look at these strategies in action.
  • Salesforce is rapidly being used for many cloud-first initiatives – from accelerating sales and marketing performance, to developing custom apps to solve a variety of business needs. Due to its wide-ranging use across the enterprise, CIOs are becoming very involved in designing the entire implementation and integration strategy for Salesforce within their organizations.

    Join this fireside chat between Derald Sue, CIO of InsideTrack, a recognized IDG Computerworld’s 2014 Premier 100 IT Leaders, and Eric Johnson, CIO of Informatica and learn:

    •How InsideTrack achieved a 100% return on its Informatica Cloud investment in just one month

    •How InsideTrack generates valuable strategic insights from millions of rows of data each day from disparate sources

    •How InsideTrack eliminated costly and time-consuming manual coding and realized a 6X return on integration development productivity

    Presented by:
    Eric Johnson, CIO, Informatica
    Derald Sue, CIO, InsideTrack
    Moderated by:
    Ashwin Viswanath, Informatica Cloud
  • Salesforce is rapidly being used for many cloud-first initiatives – from accelerating sales and marketing performance, to developing custom apps to solve a variety of business needs. Due to its wide-ranging use across the enterprise, CIOs are becoming very involved in designing the entire implementation and integration strategy for Salesforce within their organizations.

    Join this fireside chat between Derald Sue, CIO of InsideTrack, a recognized IDG Computerworld’s 2014 Premier 100 IT Leaders, and Eric Johnson, CIO of Informatica and learn:

    •How InsideTrack achieved a 100% return on its Informatica Cloud investment in just one month

    •How InsideTrack generates valuable strategic insights from millions of rows of data each day from disparate sources

    •How InsideTrack eliminated costly and time-consuming manual coding and realized a 6X return on integration development productivity

    Präsentiert von:
    Eric Johnson, CIO, Informatica
    Derald Sue, CIO, InsideTrack
    Moderiert von:
    Ashwin Viswanath, Informatica Cloud
  • How many logs files do you have?
    • Ever use them?
    • Wonder what they might contain?
    • Are they lying around unexploited, cropped or deleted to save space?
    • Do you ever try to exploit all the log data your systems produce?
    • Do you have home grown tools to manage them, only to find it’s a nightmare to keep these tools up-to-date?

    HP OLi (Operations Log Intelligence) is here to help. Based on industry leading log file management technology from ArcSight, now operations data in log files can be collected, centralized, archived and searched. The intuitive, visually-compelling dashboards provide easy, fast and powerful access to ALL your log files.

    In this webinar we'll discuss the advantages of centralizing log file management like this, and show you a quick demonstration of this new and exciting product from HP Software.
  • Fibre Channel (FC) has come a long way since its introduction to provide a networking solution that would provide the efficiency and speed necessary for storage to be networked and shared across multiple hosts. However, recently some have begun to question whether FC still has relevancy. The answer is a simple and definitive yes! It is all about the right technology for the job. Come and hear Ben Woo, Managing Director, Neuralytix, describe why Fibre Channel is the right tool for your job.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Tras crear un prototipo inicial de su aplicación para una vista previa limitada ya es hora de que el equipo pase a consolidar la arquitectura haciéndola más robusta y tolerante a los fallos antes de lanzarla oficialmente al público final.

    En este capítulo se tratan conceptos de la infraestructura de AWS tales como regiones y zonas de disponibilidad; además, se explica cómo utilizar tales características para incrementar la tolerancia de la aplicación a los fallos.

    Servicios y características tratados
    •Conceptos clave sobre infraestructura (regiones y zonas de disponibilidad)
    •Equilibro de carga elástico (Elastic Load Balancing)
    •Amazon RDS

    Demostración
    •Creación de una AMI basada en una instancia en ejecución
    •Creación y configuración de un equilibrador de carga elástico
    •Zonas de disponibilidad múltiples con Amazon RDS
    •Alarmas con Amazon CloudWatch
  • Una vez expandida con éxito la capacidad del centro de datos a Amazon Web Services para los entornos de desarrollo y prueba, el equipo de IT se enfrenta a un nuevo reto en cuanto a la capacidad, es decir, cómo almacenar la cada vez mayor cantidad de datos generados por las aplicaciones empresariales y mantener los costes a la baja. Además, también se enfrentan al reto de mantener copias de seguridad de esos datos de manera adecuada.

    Este capítulo aborda ambas cuestiones con servicios como Amazon S3 y Amazon Glacier.

    Demostración:

    •AWS Storage Gateway
    •Datos de Amazon S3 a Amazon Glacier

    Servicios y características tratados:
    •Amazon S3
    •Amazon Glacier
    •AWS Storage Gateway
    •AWS Import / Export
  • Join backup and recovery experts to find out how to build your backup and recovery requirements checklist. By the end of this session, you’ll learn how you can:

    -Cut storage requirements by up to 80%
    -Save on storage costs and performance hits to your network.
    -Leverage near-instant recovery technology for protected virtual machines or servers.
    -Automate application-aware backups and testing for data corruption.
  • Questo è il primo episodio di una serie di webinar che illustreranno le diverse modalità in cui AWS viene utilizzato dai team di sviluppo agili. Tutti gli episodi faranno riferimento a una startup impegnata nell'apertura di una nuova area di business, illustrando i vantaggi offerti dall'utilizzo di AWS. La startup puo' essere una nuova realtà o un centro di innovazione all'interno di una azienda esistente, ad esempio per seguire il lancio di un nuovo prodotto.

    In questo episodio vengono descritti i principali vantaggi di AWS per le startup e i team IT agili, soffermandosi su come il team abbia sviluppato rapidamente un prototipo funzionante utilizzando i diversi servizi offerti dalla piattaforma.
  • Channel
  • Channel profile
Up Down
  • Top 10 BYOD Tips: Managing Flexibility and Security Recorded: Apr 24 2013 51 mins
    BYOD poses tremendous security challenges for today’s IT departments. Allowing users to reap personal productivity benefits while maintaining high network security is an increasingly critical issue. This webinar will present ten best practices for planning and implementing a BYOD program that meets the needs of users and the organization.

    Topics covered include:

    •Top benefits and pitfalls of BYOD programs
    •How to plan your BYOD strategy
    •Tips to ensure program success
    •Choosing a security strategy for your network, devices and data
    •Selecting security products
    •Integrating NAC with MDM
    •Case study that demonstrates how a large U.S. bank rolled out a highly successful BYOD program
  • Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies Recorded: May 31 2012 64 mins
    Bring Your Own Device (BYOD) is a disruptive trend in IT and security management. Organizations are seeking to enable personal mobile device use at the workplace without compromising security. This timely webcast covers the fundamentals, policies and technologies that can enable fluid yet policy-based control for users and their smartphones and tablets to access network resources and sensitive information.

    Topics include:
    - risk assessment
    - policy design
    - NAC
    - MDM
    - how to tier services

    Speaker bios:

    DaleTesch, director professional services & global NAC practice leader at Integralis, brings over 11 years of Networking & Security experience repre-senting Manufacturers, Managed Service Providers, and Integrators to For-tune 500 companies. Through proven leadership he successfully has built and deployed several network security professional services organizations with results which have been publicly acknowledged through industry reviews and awards.

    Gil Friedrich, vice president of technology at ForeScout Technologies, brings over 15 years of managerial and technical experience in developing networking software. Gil holds a M.Sc. in Computer Science from Tel-Aviv University (Cum Laude) and a B.Sc. in Physics and Computer Science from Tel-Aviv University (Cum Laude).
Mobile Security and Bring Your Own Device
ForeScout's mobile security and bring your own device (BYOD) channel.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies
  • Live at: May 31 2012 5:00 pm
  • Presented by: Join Dale Tesch, director at Integralis and Gil Friedrich, vice president of technology at ForeScout Technologies
  • From:
Your email has been sent.
or close
You must be logged in to email this