Hi [[ session.user.profile.firstName ]]

Best Practices for a Secure Mobile App Ecosystem

Enterprises are increasingly turning to cloud services as an integral part of fulfilling their mobile strategy. Cloud services offer stability, scale and function beyond the capabilities of many organizations’ on-premise infrastructure. But relying on the public cloud has many IT administrators wo
Enterprises are increasingly turning to cloud services as an integral part of fulfilling their mobile strategy. Cloud services offer stability, scale and function beyond the capabilities of many organizations’ on-premise infrastructure. But relying on the public cloud has many IT administrators wondering - is it secure enough for my corporate data? Join Benjamin Robbins May 24 to learn best practices for building your mobile app ecosystem securely using public cloud services. Learn what security features are must-haves and how to identify vendors that comply. We’ll also discuss how to assure security policies can be managed and enforced for your anytime, anywhere workforce.
Recorded May 24 2012
27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Benjamin Robbins, Principal of Palador Inc
Presentation preview: Best Practices for a Secure Mobile App Ecosystem
Recommended for you:
  • Date
  • Rating
  • Views
  • Privileged Accounts and the Cyber Attack Life Cycle Privileged Accounts and the Cyber Attack Life Cycle Adam Bosnian, EVP, Global Business Dev, CyberArk, Milan Gavran, TAP Sales Mgr, FireEye Recorded: May 24 2016 44 mins
    Mandiant Consulting’s 2016 M-Trends report once again shows that cyber attacks follow a regular pattern of crashing through perimeter defenses, obtaining a credential and then using the acquired access to move laterally throughout the network and escalate privileges to complete their primary objective. Once attackers obtain privileged credentials, they can slowly gain control of the entire organization’s IT environment.

    This session will focus on how attackers find their way to the heart of enterprises, the role privileged credentials (passwords and SSH keys) play in an active cyber attack, and how the integration of CyberArk Privileged Account Security Solution and the FireEye Threat Analytics Platform (TAP) can help organizations detect, alert and rapidly respond to cyber attacks.

    The audience will be walked through a few data breach examples and shown how combining intel from both systems is used to assist in detection and response acceleration. Attendees can expect to gain an advanced understanding of how they can start leveraging their enterprise-wide data and privileged threat analytics to quickly identify and disrupt the most critical in-progress attacks.

    Register today.
  • PCI DSS: Preventing Costly Cases of Non Compliance PCI DSS: Preventing Costly Cases of Non Compliance Mathieu Gorge, VigiTrust; Terence Spies, HPE Security – Data Security; Derek Brink, Aberdeen Group; Dan Fritsche, Coalfire Recorded: May 24 2016 62 mins
    There is a substantial cost associated with reaching and maintaining PCI DSS compliance requirements, but the cost of non-compliance is often much greater. While the initial cost of the technology, staff and other resources necessary to implement satisfactory controls has its price tag, it is vital that all organizations affected by the PCI standard consider both the short and long-term costs of non-compliance as well as the benefits to meeting the requirements.

    This is especially important as PCI DSS evolves and increase in complexity as the standard moves towards becoming a federal regulation. The costs of non-compliance can far exceed the cost of systems to bring a company into compliance, as demonstrated by so many high profile data breaches. Join this executive panel as we discuss ways to prevent costly cases of non compliance with PCI DSS.
  • How secure is your Office 365 deployment? How secure is your Office 365 deployment? Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec Recorded: May 24 2016 60 mins
    Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

    Agenda:

    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication
  • How secure is your Office 365 deployment? How secure is your Office 365 deployment? Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec Recorded: May 24 2016 60 mins
    Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Consider these statistics from IDC:

    • Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
    • Over 90% of threats to enterprises emanate from email
    • 65% of threats go undetected for weeks/months

    IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.

    Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

    Learn how to enhance your Office 365 security to:

    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication

    Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
  • Dell SonicWALL’s ‘Secure Mobile Access’ Raises the Bar! Dell SonicWALL’s ‘Secure Mobile Access’ Raises the Bar! Steven Sanderson – WW SMA Product Marketing Manager Mark Hewett – WW SMA Product Manager Recorded: May 24 2016 30 mins
    See how it’s possible to give end-users fast, simple access to enterprise applications, data and resources – without compromising your security.

    In this live webinar, you’ll hear from two Dell Security solution experts on how you can manage the proliferation of devices in your workplace.

    During the interactive session, you’ll see how to:
    • Ensure only authorized users and approved devices are granted access to your business network
    • Quickly and easily provision secure mobile access and role-based privileges
    • Keep company data secure in-flight and at rest on devices
  • Stealthy or Die: How to evade adversary detection Stealthy or Die: How to evade adversary detection Tony Meehan, VP of Engineering Recorded: May 24 2016 35 mins
    Sophisticated adversaries are tampering and disabling defensive security stack. They hide and adapt their behavior upon detection of any traditional security tools. Enterprises must be stealthy and hide their presence from these advanced and adaptive adversaries.

    Endgame VP of Engineering, Tony Meehan will talk about why it is essential for organizations to be stealthy to rapidly detect and stop adversaries in enterprise network. In this webinar you will learn:
    - Why stealth matters
    - What does being stealthy mean
    - How do you avoid detection from adversaries
  • 4G Failover — Preventive Care for Your Healthcare Network 4G Failover — Preventive Care for Your Healthcare Network Ed Walton and Roger Billings of Cradlepoint Recorded: May 24 2016 45 mins
    For healthcare campuses and offices, the consequences of just a few minutes of downtime ripple across the entire organization’s operations. The proliferation of cloud applications also means suspended connectivity can cause catastrophic problems, and patients’ health and safety could be put at risk.

    While short outages are common, longer service disruptions can be catastrophic, paralyzing operations for hours. Grave as the immediate impacts of service outages are, your organization can continue to feel the consequences long after the connection has been repaired, due to damaged patient or partner loyalty, loss of trust, and diminished faith in the IT department as a whole.

    No healthcare organization wants to face these scenarios. Join us for a live webinar on Tuesday, May 24th, at 9 am PDT/12 pm EDT, because the question isn’t if your wired connectivity will go down, but what to do, or have in place, when it does go down.

    Attendees will learn about:

    + The consequences of network downtime for healthcare
    + The options for business continuity
    + How software-defined LTE connectivity is enabling the healthcare industry
    + Key considerations for choosing a wireless failover solution
  • Secure Mobility: How to Best Protect Your Data Secure Mobility: How to Best Protect Your Data Florian Malecki, Dell SonicWALL & Amar Singh, Founder and CEO, Cyber Management Alliance Recorded: May 24 2016 57 mins
    Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.

    Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
  • Secure Mobility: How to Best Protect Your Data Secure Mobility: How to Best Protect Your Data Florian Malecki, Dell SonicWALL & Amar Singh, Founder and CEO, Cyber Management Alliance Recorded: May 24 2016 57 mins
    Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.

    Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
  • Secure Mobility: How to Best Protect Your Data Secure Mobility: How to Best Protect Your Data Florian Malecki, Dell SonicWALL & Amar Singh, Founder and CEO, Cyber Management Alliance Recorded: May 24 2016 57 mins
    Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.

    Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for a Secure Mobile App Ecosystem
  • Live at: May 24 2012 6:00 pm
  • Presented by: Benjamin Robbins, Principal of Palador Inc
  • From:
Your email has been sent.
or close
You must be logged in to email this