Hi [[ session.user.profile.firstName ]]
Sort by:
    • Webinar Express: Securing BYOD Without MDM Webinar Express: Securing BYOD Without MDM Rich Campagna, VP Products, Bitglass Recorded: Sep 14 2016 5:00 pm UTC 29 mins
    • As employee-owned devices become the norm in the workplace, organizations without the appropriate security infrastructure lose control and visibility over corporate data accessed from these devices. Enabling secure BYOD has thus become one of the greatest challenges facing IT leaders.

      Mobile device management (MDM), seen by many as cumbersome and invasive, have struggled to see meaningful adoption among employees. Instead, enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. In this webinar, we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

      Read more >
    • Major Trends Transforming BYOD Security Major Trends Transforming BYOD Security Rich Campagna, VP Products, Bitglass Recorded: Jun 15 2016 5:00 pm UTC 41 mins
    • By all accounts, support for BYOD is growing rapidly across all industries as IT leaders respond to end-user demands. Adoption, however, has stagnated due to privacy concerns, cumbersome third-party apps required to secure mobile devices, and issues supporting the latest operating systems.

      In this webinar, we will discuss the major trends that are reshaping the mobile landscape, from changing end-user needs to the shift toward data-centric security. Learn how IT leaders across all major sectors are rethinking their approach to mobile security to keep pace with evolving employee behaviors.

      CPE Credit available for attendance.

      Read more >
    • Data-centric protection: the future of BYOD security Data-centric protection: the future of BYOD security Bitglass Recorded: Jul 12 2016 5:30 pm UTC 45 mins
    • Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere.

      In this webinar, we'll discuss how IT can limit risk of data leakage amid changing user habits. Learn how organizations across all industries are enabling secure mobility and productivity with a zero-touch, agentless solution.

      Read more >
    • Top 5 BYOD & Mobile Security Trends in 2016 Top 5 BYOD & Mobile Security Trends in 2016 Holger Schulze Recorded: Apr 14 2016 4:00 pm UTC 71 mins
    • What are the biggest inhibitors of BYOD adoption in the workplace? How do mobile threats impact an organization’s overall security posture? What types of operational and financial burdens are likely to occur as a result of BYOD?

      Join the webinar – Top 5 BYOD & Mobile Security Trends in 2016 – on Thursday, April 14, 2016 at 12 pm ET / 5 pm GMT.

      Join this webinar as we discuss the key findings of the 2016 BYOD and Mobile Security Survey conducted with the 300,000 member Information Security Community on LinkedIn.

      Hear data security experts from Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, and Tenable Network Security discuss the top trends influencing enterprise mobility and BYOD, including:

      • The biggest inhibitors to BYOD adoption in the workplace
      • The impact of mobile threats on your organization’s overall security posture and incidents
      • Operational and financial burdens caused by security threats
      • Recommendations on the proper data management methods/tools to minimize security risks and ensure regulatory compliance

      Read more >
    • Designing a Wi-Fi Network for the World of BYOD Designing a Wi-Fi Network for the World of BYOD Bruce Miller; Kowshik Bhat, Xirrus Recorded: Sep 17 2014 10:10 pm UTC 4 mins
    • As the world going mobile, bring-your-own-device (BYOD) is becoming an integral part of every organization. While providing a plethora of benefits for the employees, it has the potential to negatively impact organizations if their networks are unprepared.

      BYOD can quadruple the number of devices on the network, which can cause it to slow down significantly and hinder the productivity of employees and the business overall. When enabling business applications on devices, performance becomes especially critical.

      View this video to hear more on the impact of BYOD on the networks and hear more on:

      - How should wireless networks be designed to support the transition from 2.4GHz to 5GHz devices?
      - How does device optimization work in a BYOD environment, with a myriad of unique mobile devices hitting a WiFi network unpredictably?

      Read more >
    • Mobile Security You Need with BYOD Your Employees Love Mobile Security You Need with BYOD Your Employees Love Carlos Montero-Luque, Chief Technology Officer at Apperian Recorded: Aug 5 2014 4:00 pm UTC 32 mins
    • Gartner predicts that by 2017 more than 50% of companies will have implemented a BYOD (bring your own device) program. Whether you already have BYOD, or are planning for your BYOD future, security is likely one of your top concerns. Fortunately, when done right BYOD can increase employee productivity and workforce satisfaction while maintaining the security you need.

      Unfortunately, many companies often struggle by implementing BYOD policies that are too intrusive to end-user’s personal devices. The business results and security benefits are lost altogether.

      In this webinar you will learn how focusing on business apps and data can drive the mobile security you need with the BYOD your employees love.

      Carlos Montero-Luque, Chief Technology Officer at Apperian will reveal:

      • Why focusing on the true end-point of mobility, the apps and data, is the best approach to create a secure BYOD environment
      • How a zero-touch, non-intrusive BYOD security approach increases employee productivity
      • What practical steps you can take to simplify the complexity of supporting multiple devices, operating systems, and contingent workforce BYOD environments.

      Read more >