Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing the Risky Mobile Workforce Matt Woodruff, Enterprise Security Solutions, Jamf Supporting a mobile workforce will take more than just a standard mobile device management program to mitigate threats and provide effective complianc... 6 months ago | 24 mins How to Secure and Scale Apple Devices in Your Healthcare Organization Adam Mahmud Matt Woodruff Healthcare has changed drastically over the last two years. Hospital IT and security teams were forced to flex and rapidly adapt to shifting end-user ... 1 year ago | 30 mins Roadmap: Managing Device-based Access Ankit Garg, Sai Maddali, Teju Shyamsundar, Emanuele Sparvoli Devices have become a critical part of any modern organization's Identity and Access Management strategy. From managing a BYOD policy to supporting pa... 1 year ago | 39 mins Roadmap: Managing Device-based Access (Asia) Ankit Garg, Sai Maddali, Teju Shyamsundar, Emanuele Sparvoli Devices have become a critical part of any modern organization's Identity and Access Management strategy. From managing a BYOD policy to supporting pa... 2 years ago | 39 mins A Peek Into the Future of IAM in Hybrid IT (ANZ) Eric Karlisnky, Okta Lancelot M, Okta Devices have become a critical part of any modern organization's Identity and Access Management strategy. From managing a BYOD policy, to supporting p... 2 years ago | 34 mins Roadmap: Managing Device-based Access (ANZ) Ankit Garg, Sai Maddali, Teju Shyamsundar, Emanuele Sparvoli Devices have become a critical part of any modern organization's Identity and Access Management strategy. From managing a BYOD policy to supporting pa... 2 years ago | 39 mins Deliver Optimum Customer Service via Faster and Accurate Request Fulfillment Johnathan McGowan In an organization with a large number of service requests, customers often complain about how long it takes for requests to be fulfilled. Service req... 2 years ago | 15 mins How to Overcome the Four Obstacles to VDI Love Storage Switzerland, Atlantis Computing and IBM Join experts from Storage Switzerland, IBM and Atlantis Computing in this live webinar as they show you how to overcome the four most common obstacles... 9 years ago | 64 mins A Peek Into the Future of IAM in Hybrid IT (Asia) Eric Karlisnky, Okta Lancelot M, Okta Devices have become a critical part of any modern organization's Identity and Access Management strategy. From managing a BYOD policy, to supporting p... 2 years ago | 34 mins