Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies

Join Dale Tesch, director at Integralis and Gil Friedrich, vice president of technology at ForeScout Technologies
Bring Your Own Device (BYOD) is a disruptive trend in IT and security management. Organizations are seeking to enable personal mobile device use at the workplace without compromising security. This timely webcast covers the fundamentals, policies and technologies that can enable fluid yet policy-based control for users and their smartphones and tablets to access network resources and sensitive information.

Topics include:
- risk assessment
- policy design
- NAC
- MDM
- how to tier services

Speaker bios:

DaleTesch, director professional services & global NAC practice leader at Integralis, brings over 11 years of Networking & Security experience repre-senting Manufacturers, Managed Service Providers, and Integrators to For-tune 500 companies. Through proven leadership he successfully has built and deployed several network security professional services organizations with results which have been publicly acknowledged through industry reviews and awards.

Gil Friedrich, vice president of technology at ForeScout Technologies, brings over 15 years of managerial and technical experience in developing networking software. Gil holds a M.Sc. in Computer Science from Tel-Aviv University (Cum Laude) and a B.Sc. in Physics and Computer Science from Tel-Aviv University (Cum Laude).
May 31 2012
64 mins
Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live and recorded (2865)
  • Upcoming (85)
  • Date
  • Rating
  • Views
  • Join us for this live webinar where we will walk through a real-world example in which FireEye Managed Defense analysts utilized the FireEye Platform’s MVX virtual machine technology and endpoint response capabilities to identify, alert, and remediate an active Advanced Persistent Threat (APT) attack.

    In this case study we will cover:

    • How the attacker executed a “smash-and-grab” attack aimed at stealing intellectual property.
    • How FireEye detected the attack as it was beginning and re-secured the network and prevented sensitive data from leaving the client’s networks.
    • Best practices for investigating and responding to similar attacks.
  • Today most companies are witnessing an explosion in the amount of data that they store. According to recent estimates, large databases grow by 65% year over year and 85% of the data contained in these large databases is inactive. This often out-of-control data growth stems from a variety of sources and can have a negative impact on application performance, database management tasks, and overall total costs.

    During this webinar, learn how you can improve application performance while simplifying IT for Oracle applications with Informatica Smart Partitioning and Oracle ZS3 storage appliance.

    In this event, we will share how the combination of Oracle Tiered Storage and Informatica Data Archive Smart Partitioning:
    Reduces the cost of data by enabling storage tiering and compression of referentially intact data partitions
    Improves application performance up to a factor of 6X or more by automatically optimizing datasets for user requests
    Eliminates complex archiving strategies and provides full and rapid access to archived data from the native Oracle Application
  • Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Protiviti's IT Priorities Survey results reveal 2/3 companies are going through a major IT transformation in 2014. Join Protiviti's IT Consulting managing directors to discuss why.
  • Security professionals are increasingly realizing that protecting executives and corporate assets requires more than just “guns and guards.” It requires a proactive strategy to identify and prevent a threat, rather than reacting to one. So how can security professionals be proactive and minimize the threats that originate from the Internet?

    In this webcast we’ll look at how you can use an individual’s online “footprint” to identify potential threats and develop a more effective security plan. We’ll also present a case study of one of our own executives and show why online threat intelligence is not the same as news alerts or monitoring social media for brand buzz.
  • Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
  • Email Gateway 7.6 including advanced threat defense, hybrid cloud setup and ”ClickProtect” spear phishing protection.
  • Channel
  • Channel profile
Up Down
  • Top 10 BYOD Tips: Managing Flexibility and Security Recorded: Apr 24 2013 51 mins
    BYOD poses tremendous security challenges for today’s IT departments. Allowing users to reap personal productivity benefits while maintaining high network security is an increasingly critical issue. This webinar will present ten best practices for planning and implementing a BYOD program that meets the needs of users and the organization.

    Topics covered include:

    •Top benefits and pitfalls of BYOD programs
    •How to plan your BYOD strategy
    •Tips to ensure program success
    •Choosing a security strategy for your network, devices and data
    •Selecting security products
    •Integrating NAC with MDM
    •Case study that demonstrates how a large U.S. bank rolled out a highly successful BYOD program
  • Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies Recorded: May 31 2012 64 mins
    Bring Your Own Device (BYOD) is a disruptive trend in IT and security management. Organizations are seeking to enable personal mobile device use at the workplace without compromising security. This timely webcast covers the fundamentals, policies and technologies that can enable fluid yet policy-based control for users and their smartphones and tablets to access network resources and sensitive information.

    Topics include:
    - risk assessment
    - policy design
    - NAC
    - MDM
    - how to tier services

    Speaker bios:

    DaleTesch, director professional services & global NAC practice leader at Integralis, brings over 11 years of Networking & Security experience repre-senting Manufacturers, Managed Service Providers, and Integrators to For-tune 500 companies. Through proven leadership he successfully has built and deployed several network security professional services organizations with results which have been publicly acknowledged through industry reviews and awards.

    Gil Friedrich, vice president of technology at ForeScout Technologies, brings over 15 years of managerial and technical experience in developing networking software. Gil holds a M.Sc. in Computer Science from Tel-Aviv University (Cum Laude) and a B.Sc. in Physics and Computer Science from Tel-Aviv University (Cum Laude).
Mobile Security and Bring Your Own Device
ForeScout's mobile security and bring your own device (BYOD) channel.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies
  • Live at: May 31 2012 5:00 pm
  • Presented by: Join Dale Tesch, director at Integralis and Gil Friedrich, vice president of technology at ForeScout Technologies
  • From:
Your email has been sent.
or close
You must be logged in to email this