Hi [[ session.user.profile.firstName ]]
Sort by:
    • Webinar Express: Securing BYOD Without MDM
      Webinar Express: Securing BYOD Without MDM Rich Campagna, VP Products, Bitglass Recorded: Sep 14 2016 5:00 pm UTC 29 mins
    • As employee-owned devices become the norm in the workplace, organizations without the appropriate security infrastructure lose control and visibility over corporate data accessed from these devices. Enabling secure BYOD has thus become one of the greatest challenges facing IT leaders.

      Mobile device management (MDM), seen by many as cumbersome and invasive, have struggled to see meaningful adoption among employees. Instead, enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. In this webinar, we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

      Read more >
    • Major Trends Transforming BYOD Security
      Major Trends Transforming BYOD Security Rich Campagna, VP Products, Bitglass Recorded: Jun 15 2016 5:00 pm UTC 41 mins
    • By all accounts, support for BYOD is growing rapidly across all industries as IT leaders respond to end-user demands. Adoption, however, has stagnated due to privacy concerns, cumbersome third-party apps required to secure mobile devices, and issues supporting the latest operating systems.

      In this webinar, we will discuss the major trends that are reshaping the mobile landscape, from changing end-user needs to the shift toward data-centric security. Learn how IT leaders across all major sectors are rethinking their approach to mobile security to keep pace with evolving employee behaviors.

      CPE Credit available for attendance.

      Read more >
    • Solving IoT & BYOD Challenges: The Answers are in your Network
      Solving IoT & BYOD Challenges: The Answers are in your Network Shaun Henderson & Peter Connolly, ExtraHop Networks Recorded: Jan 18 2017 6:00 pm UTC 20 mins
    • Whether they are ready for it or not, IT Operations teams have the Internet of Things, including BYOD devices such as smart watches, added to their list of responsibilities. With employees bringing in potentially compromised devices, it's time for enterprise IT to understand their environment and not just tick the compliance box. On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence. A new monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents! Tune in for a technical deep-dive into the network impact of IoT, how to make the most of your data from connected devices, and how to mitigate potential security and threat risks involved.

      Read more >
    • Data-centric protection: the future of BYOD security
      Data-centric protection: the future of BYOD security Bitglass Recorded: Jul 12 2016 5:30 pm UTC 45 mins
    • Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere.

      In this webinar, we'll discuss how IT can limit risk of data leakage amid changing user habits. Learn how organizations across all industries are enabling secure mobility and productivity with a zero-touch, agentless solution.

      Read more >
    • Top 5 BYOD & Mobile Security Trends in 2016
      Top 5 BYOD & Mobile Security Trends in 2016 Holger Schulze Recorded: Apr 14 2016 4:00 pm UTC 71 mins
    • What are the biggest inhibitors of BYOD adoption in the workplace? How do mobile threats impact an organization’s overall security posture? What types of operational and financial burdens are likely to occur as a result of BYOD?

      Join the webinar – Top 5 BYOD & Mobile Security Trends in 2016 – on Thursday, April 14, 2016 at 12 pm ET / 5 pm GMT.

      Join this webinar as we discuss the key findings of the 2016 BYOD and Mobile Security Survey conducted with the 300,000 member Information Security Community on LinkedIn.

      Hear data security experts from Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, and Tenable Network Security discuss the top trends influencing enterprise mobility and BYOD, including:

      • The biggest inhibitors to BYOD adoption in the workplace
      • The impact of mobile threats on your organization’s overall security posture and incidents
      • Operational and financial burdens caused by security threats
      • Recommendations on the proper data management methods/tools to minimize security risks and ensure regulatory compliance

      Read more >
    • Designing a Wi-Fi Network for the World of BYOD
      Designing a Wi-Fi Network for the World of BYOD Bruce Miller; Kowshik Bhat, Xirrus Recorded: Sep 17 2014 10:10 pm UTC 4 mins
    • As the world going mobile, bring-your-own-device (BYOD) is becoming an integral part of every organization. While providing a plethora of benefits for the employees, it has the potential to negatively impact organizations if their networks are unprepared.

      BYOD can quadruple the number of devices on the network, which can cause it to slow down significantly and hinder the productivity of employees and the business overall. When enabling business applications on devices, performance becomes especially critical.

      View this video to hear more on the impact of BYOD on the networks and hear more on:

      - How should wireless networks be designed to support the transition from 2.4GHz to 5GHz devices?
      - How does device optimization work in a BYOD environment, with a myriad of unique mobile devices hitting a WiFi network unpredictably?

      Read more >