Hi [[ session.user.profile.firstName ]]
Sort by:
    • Webinar Express: Securing BYOD Without MDM
      Webinar Express: Securing BYOD Without MDM Rich Campagna, VP Products, Bitglass Recorded: Sep 14 2016 5:00 pm UTC 29 mins
    • As employee-owned devices become the norm in the workplace, organizations without the appropriate security infrastructure lose control and visibility over corporate data accessed from these devices. Enabling secure BYOD has thus become one of the greatest challenges facing IT leaders.

      Mobile device management (MDM), seen by many as cumbersome and invasive, have struggled to see meaningful adoption among employees. Instead, enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. In this webinar, we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

      Read more >
    • Briefings Part 3: The Future of BYOD Security
      Briefings Part 3: The Future of BYOD Security Amish Kohli, Solutions Engineer, Bitglass; Brandon Dunlap, Moderator Recorded: May 4 2017 5:00 pm UTC 58 mins
    • Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere. Join Bitglass and (ISC)2 for the 3rd part of our 3-part Briefings series on May 4, 2017 at 1:00PM Eastern where n this we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

      Read more >
    • Major Trends Transforming BYOD Security
      Major Trends Transforming BYOD Security Rich Campagna, VP Products, Bitglass Recorded: Jun 15 2016 5:00 pm UTC 41 mins
    • By all accounts, support for BYOD is growing rapidly across all industries as IT leaders respond to end-user demands. Adoption, however, has stagnated due to privacy concerns, cumbersome third-party apps required to secure mobile devices, and issues supporting the latest operating systems.

      In this webinar, we will discuss the major trends that are reshaping the mobile landscape, from changing end-user needs to the shift toward data-centric security. Learn how IT leaders across all major sectors are rethinking their approach to mobile security to keep pace with evolving employee behaviors.

      CPE Credit available for attendance.

      Read more >
    • Solving IoT & BYOD Challenges: The Answers are in your Network
      Solving IoT & BYOD Challenges: The Answers are in your Network Shaun Henderson & Peter Connolly, ExtraHop Networks Recorded: Jan 18 2017 6:00 pm UTC 20 mins
    • Whether they are ready for it or not, IT Operations teams have the Internet of Things, including BYOD devices such as smart watches, added to their list of responsibilities. With employees bringing in potentially compromised devices, it's time for enterprise IT to understand their environment and not just tick the compliance box. On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence. A new monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents! Tune in for a technical deep-dive into the network impact of IoT, how to make the most of your data from connected devices, and how to mitigate potential security and threat risks involved.

      Read more >
    • Data-centric protection: the future of BYOD security
      Data-centric protection: the future of BYOD security Bitglass Recorded: Jul 12 2016 5:30 pm UTC 45 mins
    • Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere.

      In this webinar, we'll discuss how IT can limit risk of data leakage amid changing user habits. Learn how organizations across all industries are enabling secure mobility and productivity with a zero-touch, agentless solution.

      Read more >
    • Top 5 BYOD & Mobile Security Trends in 2016
      Top 5 BYOD & Mobile Security Trends in 2016 Holger Schulze Recorded: Apr 14 2016 4:00 pm UTC 71 mins
    • What are the biggest inhibitors of BYOD adoption in the workplace? How do mobile threats impact an organization’s overall security posture? What types of operational and financial burdens are likely to occur as a result of BYOD?

      Join the webinar – Top 5 BYOD & Mobile Security Trends in 2016 – on Thursday, April 14, 2016 at 12 pm ET / 5 pm GMT.

      Join this webinar as we discuss the key findings of the 2016 BYOD and Mobile Security Survey conducted with the 300,000 member Information Security Community on LinkedIn.

      Hear data security experts from Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, and Tenable Network Security discuss the top trends influencing enterprise mobility and BYOD, including:

      • The biggest inhibitors to BYOD adoption in the workplace
      • The impact of mobile threats on your organization’s overall security posture and incidents
      • Operational and financial burdens caused by security threats
      • Recommendations on the proper data management methods/tools to minimize security risks and ensure regulatory compliance

      Read more >
    • Enabling BYOD and Secure Mobile Device Management in Healthcare
      Enabling BYOD and Secure Mobile Device Management in Healthcare Jana Campbell, CISSP, Modern Workplace Solution Specialist & Alfred Ojukwu, National Mobility & Security Technical Specialist Recorded: May 10 2017 6:00 pm UTC 54 mins
    • Go beyond commodity mobile device management solutions - manage applications and data, not the device.

      In the modern workplace, managing mobile devices has become increasingly relevant. Smarter mobile device management requires the implementation of more controls to protect corporate data access through external networks. In this session, you'll learn how Microsoft can manage applications and data with or without device management. Learn how to go beyond commodity mobile device management solutions to enable secure mobile productivity with minimal IT management overhead.

      Join this webcast to learn about:
      - Intune Device Management: Understand how to enroll devices, deploy policies and apps, manage and monitor devices, and apply conditions against users and devices to using the latest Intune Portal
      - Intune App Protection: Apply Intune App-layer to protect corporate data with managed apps and app-targeted policies, including managed browsers
      - Data Loss Prevention: Apply granular controls against Intune licensed users, to easily manage how corporate data is accessed and shared across multiple applications and devices
      - Rich Monitoring: Understand the rich reporting and monitoring built in to the latest Intune Portal

      This webcast is part of our Modern Workplace in Healthcare webcast series. Sign up for this session, or the entire series today!

      Read more >