Browse communities
Browse communities
Presenting a webinar?

Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies

Join Dale Tesch, director at Integralis and Gil Friedrich, vice president of technology at ForeScout Technologies
Bring Your Own Device (BYOD) is a disruptive trend in IT and security management. Organizations are seeking to enable personal mobile device use at the workplace without compromising security. This timely webcast covers the fundamentals, policies and technologies that can enable fluid yet policy-based control for users and their smartphones and tablets to access network resources and sensitive information.

Topics include:
- risk assessment
- policy design
- NAC
- MDM
- how to tier services

Speaker bios:

DaleTesch, director professional services & global NAC practice leader at Integralis, brings over 11 years of Networking & Security experience repre-senting Manufacturers, Managed Service Providers, and Integrators to For-tune 500 companies. Through proven leadership he successfully has built and deployed several network security professional services organizations with results which have been publicly acknowledged through industry reviews and awards.

Gil Friedrich, vice president of technology at ForeScout Technologies, brings over 15 years of managerial and technical experience in developing networking software. Gil holds a M.Sc. in Computer Science from Tel-Aviv University (Cum Laude) and a B.Sc. in Physics and Computer Science from Tel-Aviv University (Cum Laude).
May 31 2012
64 mins
Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies
More from this community:

IT Security

  • Live and recorded (5371)
  • Upcoming (111)
  • Date
  • Rating
  • Views
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Channel
  • Channel profile
  • Top 10 BYOD Tips: Managing Flexibility and Security Recorded: Apr 24 2013 51 mins
    Presented by Jack Marsal, Director of Solution Marketing, ForeScout
    BYOD poses tremendous security challenges for today’s IT departments. Allowing users to reap personal productivity benefits while maintaining high network security is an increasingly critical issue. This webinar will present ten best practices for planning and implementing a BYOD program that meets the needs of users and the organization.

    Topics covered include:

    •Top benefits and pitfalls of BYOD programs
    •How to plan your BYOD strategy
    •Tips to ensure program success
    •Choosing a security strategy for your network, devices and data
    •Selecting security products
    •Integrating NAC with MDM
    •Case study that demonstrates how a large U.S. bank rolled out a highly successful BYOD program
  • Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies Recorded: May 31 2012 64 mins
    Join Dale Tesch, director at Integralis and Gil Friedrich, vice president of technology at ForeScout Technologies
    Bring Your Own Device (BYOD) is a disruptive trend in IT and security management. Organizations are seeking to enable personal mobile device use at the workplace without compromising security. This timely webcast covers the fundamentals, policies and technologies that can enable fluid yet policy-based control for users and their smartphones and tablets to access network resources and sensitive information.

    Topics include:
    - risk assessment
    - policy design
    - NAC
    - MDM
    - how to tier services

    Speaker bios:

    DaleTesch, director professional services & global NAC practice leader at Integralis, brings over 11 years of Networking & Security experience repre-senting Manufacturers, Managed Service Providers, and Integrators to For-tune 500 companies. Through proven leadership he successfully has built and deployed several network security professional services organizations with results which have been publicly acknowledged through industry reviews and awards.

    Gil Friedrich, vice president of technology at ForeScout Technologies, brings over 15 years of managerial and technical experience in developing networking software. Gil holds a M.Sc. in Computer Science from Tel-Aviv University (Cum Laude) and a B.Sc. in Physics and Computer Science from Tel-Aviv University (Cum Laude).
Mobile Security and Bring Your Own Device
ForeScout's mobile security and bring your own device (BYOD) channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Bring Your Own Device Essentials: Fundamentals, Considerations and Technologies
  • Live at: May 31 2012 5:00 pm
  • Presented by: Join Dale Tesch, director at Integralis and Gil Friedrich, vice president of technology at ForeScout Technologies
  • From:
Your email has been sent.
or close
You must be logged in to email this