Consumer Mobile Technology in the Enterprise: A Leap of Faith?

Philippe Winthrop,Founder/Mgng Director,The Enterprise Mobility Foundation,Cesare Garlati,Pres. Mobile Security,Trend Micro
An increasing number of companies are opening corporate networks and data to consumer mobile devices, as employees demand to bring their own smartphones and tablets to work. However, consumer mobile technology is generally not considered as secure and manageable as required by the enterprise. And too many companies make the mistake of trying to stop the influx of consumer IT. What new mobile platforms will your organization contend with? What built-in security models do they provide? What vulnerabilities are they exposed to? How rigorous is the scrutiny of the official application markets? Is the corporate data stored in these devices safe?

In this webcast, leading mobility experts from Trend Micro and The Enterprise Mobility Foundation answer these questions and, more importantly, reveal solutions and best practices for your company to safely embrace consumer mobile technology in the enterprise.

About the presenters:

Philippe Winthrop is the Founder and Managing Director of The Enterprise Mobility Foundation, the organization behind The Enterprise Mobility Forum, the fastest growing content portal and social network exclusively dedicated to enterprise mobility. Philippe has spent his entire career researching emerging technologies and their impact on the corporate value chain.

As Vice President of Mobile Security at Trend Micro, Cesare Garlati serves as the evangelist for the enterprise mobility product line. Cesare is responsible for raising awareness of Trend Micro’s vision for security solutions in an increasingly consumerized IT world, as well as ensuring that customer insights are incorporated into Trend solutions.
Apr 24 2012
70 mins
Consumer Mobile Technology in the Enterprise: A Leap of Faith?
Join us for this summit:
More from this community:


Webinars and videos

  • Live and recorded (1860)
  • Upcoming (70)
  • Date
  • Rating
  • Views
  • The Operations Bridge is “the” solution for IT Operations to effectively address the challenges they face when it comes to managing the new style of IT: complex composite applications, virtualized environments, cloud-based services, big data, and a variety of management solutions from different vendors. In this session, you will learn how the HP Operations Bridge solution allows you to take up those challenges and consolidate all your existing IT monitoring solutions, providing a unique solution to maximize efficiency and improve runtime and performance of your IT services.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • 10 minute "whiteboard" style video that explains what Quorum does and the unique value for mid-market organizations
  • Virtual Desktop Infrastructure (VDI) places unique performance demands on storage. During the course of the day the I/O traffic changes from heavy read, to heavy write and then ends with a mixture of read and write requirements. This workload profile is so unique that many VDI planners end up selecting a dedicated storage solution for their VDI environment.

    Join Storage Switzerland and Fusion-io for the live webinar event "Avoid the Waste of a VDI-only Storage Solution”.

    In this webinar, you will learn:
    1. The challenges associated with deploying storage for VDI
    2. How current solutions attempt to solve these problems
    3. How to save money by supporting VDI and other application workloads on the same storage
  • The C-Suite in every organization is obsessed with the buzz around Big Data and according to industry pundits almost 9 out of 10 organizations today have included this growing trend in their IT plans for 2014. But we all know that when it comes to execution and extracting true business value out of Big Data, only a fraction of the companies are successful. Believe it or not, infrastructure platforms play a key role in demonstrating the power of performance to deliver blazing speed analytics and makes all the difference if you can get a query answered in 3 seconds vs. 3 hours!

    Welcome to the new style of IT and a paradigm shift towards converged infrastructure or as IDC states it as the “3rd platform”, where you are no longer bound by the limitations of your traditional datacenter. Instead of plumbing or retrofitting your existing landscape you now have proven alternatives to augment your legacy environment with leading innovative platforms that are purpose built, seamlessly integrated and can be deployed in days vs. months. Learn from the best practices of some of our customers who have embarked on this journey already and paved the way for handling Big Data!
  • Autonomic Software significantly expands the capabilities of McAfee ePO. Autonomic’s three suites are all integrated into ePO with no need for separate console, databases, and reports. They are “As McAfee As McAfee”!

    Autonomic Patch Manager, EndPoint Manager and Power Manager suites provide improved security, and managing of end points, at virtually no charge when incorporating Power Manager.

    Join McAfee and its 2013 MVP Partner of the Year to learn how the integrated solution provides:
    • Increases Scalability – Delivery of patches to both large organizations and small-to-mid-sized organizations
    • Reduces Costs - Using Power & Patch Management Suites
    • Simplifies Complexity - Maintains a secure environment with minimal human intervention using EndPoint Suite
    • Easily Customizable Solutions – For unique requirements
  • As more and more companies look to take advantage of all of the benefits afforded with cloud-based infrastructures, the discussion often quickly turns to “How do we get there?” For some companies, this single migration question can create an insurmountable roadblock that either keeps them from moving to the cloud or severely delays their migration. Join Michael McCracken, HOSTING’s Director of Professional Services, as he explores different cloud migration strategies along with the benefits and risks associated with each of those strategies.
  • Channel
  • Channel profile
Up Down
  • Windows XP: Survival & Migration Guide for Mid Enterprise Firms May 20 2014 5:00 pm UTC 60 mins
    After thirteen years, the last Microsoft patch for its popular OS has been distributed. Experts estimate that XP’s installed base is up to 30% of all devices; some organizations seem to have no plans to change. But end-of-support means no security fixes, patches or software updates. XP users are expected to become the target of hackers, according to research firm Gartner. Join Trend Micro’s threat researcher Christopher Budd as he outlines 5 tips to stay protected. Budd will also delve into security implications and recommend migration steps for Mid Enterprise organizations of all industries.
  • Anatomy of the Target Stores Breach: Lessons Learned May 8 2014 5:00 pm UTC 60 mins
    Target Stores has invested millions in "next gen" cyber security and had received PCI certification. And yet hackers compromised its systems and credit card data during the busy retail holiday season. Over 70 million people were impacted. Join Ken Donze/Senior Engineer - Trend Micro as he outlines the breach, how people and processes were impacted, and how warnings and false positives were overlooked. As more and more firms consolidate data centers and invest in new solutions, how can human error and social engineering be mitigated and risks managed? How can organizations balance risk and security investment? What Best Practices and controls are recommended?
  • Cyber Threat Defense Report Apr 22 2014 3:00 pm UTC 60 mins
    Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Optimizing Security for Amazon Web Services Recorded: Apr 2 2014 62 mins
    This webcast focuses on securing AWS deployments. Join Trend Micro's Mark Nunnikhoven, Principal Engineer for Cloud Technolgies, as he recaps the realities of securing today's hybrid cloud environments and approaches for securing critical applications and data.
  • SharePoint Security Risks & Compliance: Best Practices for Governing Recorded: Mar 19 2014 50 mins
    Organizations are generating vast amounts of content and, with mobile access, enterprise social collaboration and cloud solutions, employees are sharing information in new ways, continually expanding how we collaborate. Microsoft SharePoint has become the corporate information hub for most organizations, and SharePoint content is often coming from internal employees as well as external partners and clients. This presents new risks to organizations like the inadvertent exposure to sensitive information, malware entering the enterprise and regulatory compliance issues. It’s important to consider if you are protecting yourself against these types of security risks and compliance issues. Is your corporate SharePoint Strategy using the best practices available for information security and governance? In this live webinar, Antonio Maio, Microsoft SharePoint MVP, and Chris Taylor, Trend Micro Director of Global Product Marketing, will discuss how current shifts in SharePoint utilization can create risks and compliance concerns for even the most veteran users and IT organizations
  • Defend Your Organization from Emerging Cyber Attacks Recorded: Feb 20 2014 62 mins
    Are you confident that your organization is fully protected from the emerging digital crimes occurring today? Join cyber security experts and learn why your data has monetary value in the cyber market.

    This educational webinar will be highly interactive, bringing together industry practitioners from Trend Micro’s Forward-looking Threat Research (FTR) Team and Dell SecureWorks’ Counter Threat Unit (CTU) team to help you combat the cyber underworld. This webinar is free to attend, but space is limited so register today!
  • TARGET-ed Attacks: What Retailers Need to Know about Recent Data Breaches Recorded: Jan 30 2014 47 mins
    The recent high-profile breaches at Target and other retailers—that reportedly lifted personal data from over 100 million customers including one-third of US citizens—has many retailers, including Trend Micro customers, wondering whether they are protected from a similar type of custom attack. During this webinar, security industry expert JD Sherry—a frequent guest on Fox News regarding the recent retail data breaches—will share an initial analysis of publicly available information by Trend Micro’s threat research team. IT security professionals and business leaders in retail and other industries will gain a deeper understanding of the data breach based on Trend Micro’s past experience with similar attacks. You also will learn about proven practices to create a layered defense as an effective strategy to detect and prevent Target-like attacks.
  • Threat Predictions 2014 - Enterprise Edition Recorded: Jan 28 2014 41 mins
    2013 saw enterprise, government and F100 firms all face catastrophic insider threats and data breaches. What does 2014 hold for Enterprise organizations with widely dispersed devices, a shrinking sense of privacy, supply chain risks and ever-increasing compliance requirements? How can larger firms optimize security ROI ?
    Please join Jon Clay, Sr. Manager of Threat Research at Trend Micro, for this LIVE webcast. He will outline the 2014 security risk assessment from Trend Micro’s CTO Raimund Genes, along with the 1,500 global threat researchers staffing the frontlines. You will have an opportunity to ask questions of the experts and learn from peers.
    TOPICS INCLUDE: Lessons learned from 2013; threat assessment for 2014; data breach insights; risks of legacy exploits; viewpoint of law enforcement; and staying a step ahead of cyber criminals.
    AUDIENCE: IT decision makers, risk & compliance teams, network engineers, infrastructure professionals, security architects, and frontline managers who want increased visibility into the 2014 security environment.
    PRESENTER: Jon Clay, Sr. Manager, Trend Micro’s Threat Research Group. Jon Clay is responsible for managing threat communication and serving as a public speaker for the wide range of core technologies within Trend Micro. He has been with Trend Micro for over 17 years and has held previous roles in Sales Engineering and Training. Jon has a BS in Electrical Engineering with a Minor in Computer Engineering from Michigan State University.
  • Threat Predictions 2014 - SMB Edition Recorded: Jan 28 2014 55 mins
    2013 was a banner year for malware, breaches and insider threats. SMB firms with limited IT staff, expertise and security funding can be challenged to identify and mitigate these never-ending risks. What does 2014 hold for security in the cloud, at the endpoint and the mobile professional? What steps can SMB firms take to protect themselves?
    Please join this LIVE webcast with Jon Clay, Sr. Manager of Threat Research at Trend Micro. He will outline the 2014 security risk assessment from Trend Micro’s CTO Raimund Genes, along with the 1,500 global threat researchers staffing the frontlines.

    TOPICS INCLUDE: Lessons learned from 2013; looking into the future of security threats; implications for SMB firms on a budget; and highlights on cloud, mobile and endpoint security risks

    AUDIENCE: IT decision makers, business owners and managers, security teams and frontline managers who want increased visibility into the 2014 security environment.

    PRESENTER: Jon Clay, Sr. Manager, Trend Micro’s Threat Research Group. Jon Clay is responsible for managing threat communication and serving as a public speaker for the wide range of core technologies within Trend Micro. He has been with Trend Micro for over 17 years and has held previous roles in Sales Engineering and Training. Jon has a BS in Electrical Engineering with a Minor in Computer Engineering from Michigan State University.
  • Addressing Dropbox Security Concerns Recorded: Jan 15 2014 48 mins
    Dropbox and other sync-and-share cloud services are growing rapidly. While there are productivity and convenience benefits, it also creates important security and compliance concerns. Is your confidential data safe in the cloud? Who has access to it? What security controls does Dropbox offer? What options are out there? Join Steve Duncan from Trend Micro who will address these security concerns in a 45-minute webinar. Gain a better understanding of the scope of Dropbox-type use, related security risks, and uncover more robust alternatives that solve these concerns.
  • Realize Higher ROI On Security Spending Recorded: Nov 13 2013 56 mins
    Organizations are seeing large increases in targeted attacks and advanced persistent threats (APTs). Often these advanced attacks involve multiple stages, spanning email, web, traditional endpoints, and corporate servers. Security professionals invest in security controls at each layer of the network stack to protect against these multi-faceted attacks. While multiple security point-products may be used, some prefer to purchase their solutions from a single vendor for better overall management and fewer gaps in security. Forrester, in a recent Total Economic Impact™ Study commissioned by Trend Micro, interviewed current Trend Micro customers, who identified reduced security-related issues and remediation time, faster security reporting tasks, consolidated vendor costs, improved end-user productivity, and overall a positive ROI since investing in and deploying a solution based on Trend Micro enterprise security products.
  • Why Traditional Anti-Virus Protection Is Not Enough Recorded: Nov 12 2013 37 mins
    Learn the factors as to why traditional Anti-Virus is no longer enough to protect your businesses from the risks posed by complex security threats of today. Macky Cruz, Lead Security Engineer for TrendLabs, outlines how the changes in digital trends and technologies introduce stealthier and multi-platform threats.
    • Discover what kinds of security threats plagued SMBs.
    • Understand how malware infection and information theft can impact your businesses
    • Learn how comprehensive security can protect your businesses from security risks.

    Who should attend this webinar: This webinar has been designed to cater to both technical and non-technical viewers. It is especially useful for IT personnel and SMB owners and/or decision makers.
  • Grading 2013 Security Threat Predictions from Trend Micro Recorded: Sep 24 2013 33 mins
    Each year Trend Micro predicts what the threat landscape will be in the next year. In this presentation we will review and grade how most of these predictions have rated. From APTs to Zbot, you will receive information on a variety of security topics discussed in our 2013 predictions developed by Trend Micro CTO, Raimund Genes, and our threat researchers from across the globe. Watch and listen as Jon Clay, Security Technology Expert with Trend Micro, shares the results.
  • Using "Big Data" to Identify and Protect Against Global Computing Threats Recorded: Sep 24 2013 22 mins
    Every computing system is globally linked; desktops, servers, laptops, tablets and handheld devices. They all access information through networks corporates don’t control, thus increasing these devices and their organizations to greater risk of contamination. This webinar discusses how Trend has utilized global “Big Data” gathering to enhance our risk identification and analysis, deliver better intelligence thus protection through a global cloud infrastructure we call Smart Protection Network. This SPN extends Trends risk identification and protection reach exponentially over conventional technology in its ability to find global threats, identify trends and dynamically deliver this intelligence and protection to local customers on a global basis.
  • Stay Protected - Think Like a Hacker Recorded: Sep 16 2013 28 mins
    The greatest operational and reputational risk a corporation faces is cyber. Today's hackers have evolved their capabilities and organization. The FBI 's number one criminal priority is cybercrime. This webinar will spin the chess board on hackers. Tom Kellermann/VP of Cyber Security at Trend Micro will outline how understanding offensive tactics can improve your defensive cyber posture.
  • Next Gen Incident Response: 3 Key Challenges Recorded: Aug 20 2013 45 mins
    In today’s global economy, IT professionals and security decision makers must combat the ever-changing threat landscape and actors that are keen on disrupting their organization. Securing virtualized and cloud ecosystems has become a top priority for both security-centric and C-level executives. JD Sherry, VP of Technology and Solutions for Trend Micro, will explore the top 3 challenges that organizations of all sizes are taking to manage Incident Response in an always-under-attack environment. He will outline the evolution facing Incident Response and how it fundamentally changes in this new paradigm of cloud computing and third-party hosting infrastructures.
  • Protect your IT Infrastructure to Prevent Targeted Attacks Recorded: Jul 23 2013 38 mins
    For most organizations, the network perimeter has expanded and blurred with the proliferation of social networking, remote access, and cloud computing. In addition, with the evident constant stream of new viruses, worms, rootkits, denial of service (DDoS) attacks and other security threats achieve substantial publicity; such threats don’t usually receive notice until significant damage has already occurred. And operations like yours are frequently required to provide a degree of network access to vendor partners and customers so that they can access pertinent information. With all of these potential entry points, it has never been more imperative for IT stakeholders to proactively support a comprehensive risk management strategy.

    Join Trend Micro and CDW to learn how to protect your organization from the various forms of sophisticated attacks aimed specifically at your users, your gas control systems, your customers’ information, or all of the above. CDW has the expertise, product and the services to help control and mitigate your risk exposure before damage has already occurred with Trend Micro Deep Discovery as a customizable solution specific to your environment as a part of your Defense in Depth strategy. Reduce your exposure.
  • Exposing Risks and Opportunities of Mobility & Consumerization in Education Recorded: May 21 2013 40 mins
    The explosion of consumer technologies are changing the Information Technology landscape as we know it. While mobility and consumerization can introduce many risks, it also opens up an enormous productivity opportunity that needs to be exploited! Dive into the latest threat landscape as it relates to mobile as well as how security is actually enabling education!
  • The Cybercriminal Underground Recorded: May 10 2013 28 mins
    This presentation will discuss the most recent information on advances within the cybercriminal underground. Discussion will revolve around the different cybercriminal business models used within the underground and how this affects you. From Organized crime to the Mentor/Apprentice models we’ll give you information you need to better understand how the underground economy works.
  • Advanced Security Options for Mid Market Business Recorded: Mar 13 2013 45 mins
    Mid Market organizations face even greater security threats than before. Their organizational growth and assets – be it intellectual property, PII or credit card data – increases the risk of a breach or targeted attack. Limited IT staff wearing many hats may find it challenging to keep up with the ever-changing threat landscape.

    Join us for this webinar and gain a deeper understanding of the:

    · Threats that Mid Market firms face across physical, virtual and cloud environments

    · Three security steps that SMB firms can implement to enhance their security posture today

    · Advanced Persistent Threats aimed at higher-risk Mid Market firms and how to overcome

    · Resources and expertise available to augment organizational security

    Comware CEO Charles Carlson in this webinar invites guest JD Sherry to share his security expertise with Mid Market businesses as well as protecting state and local governments. JD Sherry, Director of Product and Technology at Trend Micro, has significant mobile and cloud experience in developing secure, scalable IT solutions designed to meet strict compliance and payment card regulations.
Securing Your Journey to the Cloud
Thought leadership webinar series
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Consumer Mobile Technology in the Enterprise: A Leap of Faith?
  • Live at: Apr 24 2012 5:00 pm
  • Presented by: Philippe Winthrop,Founder/Mgng Director,The Enterprise Mobility Foundation,Cesare Garlati,Pres. Mobile Security,Trend Micro
  • From:
Your email has been sent.
or close
You must be logged in to email this