Hi [[ session.user.profile.firstName ]]
Sort by:
    • Major Trends Transforming BYOD Security Major Trends Transforming BYOD Security Rich Campagna, VP Products, Bitglass Upcoming: Jun 15 2016 5:00 pm UTC 60 mins
    • By all accounts, support for BYOD is growing rapidly across all industries as IT leaders respond to end-user demands. Adoption, however, has stagnated due to privacy concerns, cumbersome third-party apps required to secure mobile devices, and issues supporting the latest operating systems.

      In this webinar, we will discuss the major trends that are reshaping the mobile landscape, from changing end-user needs to the shift toward data-centric security. Learn how IT leaders across all major sectors are rethinking their approach to mobile security to keep pace with evolving employee behaviors.

      CPE Credit available for attendance.

      Read more >
    • Top 5 BYOD & Mobile Security Trends in 2016 Top 5 BYOD & Mobile Security Trends in 2016 Holger Schulze Recorded: Apr 14 2016 4:00 pm UTC 71 mins
    • What are the biggest inhibitors of BYOD adoption in the workplace? How do mobile threats impact an organization’s overall security posture? What types of operational and financial burdens are likely to occur as a result of BYOD?

      Join the webinar – Top 5 BYOD & Mobile Security Trends in 2016 – on Thursday, April 14, 2016 at 12 pm ET / 5 pm GMT.

      Join this webinar as we discuss the key findings of the 2016 BYOD and Mobile Security Survey conducted with the 300,000 member Information Security Community on LinkedIn.

      Hear data security experts from Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, and Tenable Network Security discuss the top trends influencing enterprise mobility and BYOD, including:

      • The biggest inhibitors to BYOD adoption in the workplace
      • The impact of mobile threats on your organization’s overall security posture and incidents
      • Operational and financial burdens caused by security threats
      • Recommendations on the proper data management methods/tools to minimize security risks and ensure regulatory compliance

      Read more >
    • Designing a Wi-Fi Network for the World of BYOD Designing a Wi-Fi Network for the World of BYOD Bruce Miller; Kowshik Bhat, Xirrus Recorded: Sep 17 2014 10:10 pm UTC 4 mins
    • As the world going mobile, bring-your-own-device (BYOD) is becoming an integral part of every organization. While providing a plethora of benefits for the employees, it has the potential to negatively impact organizations if their networks are unprepared.

      BYOD can quadruple the number of devices on the network, which can cause it to slow down significantly and hinder the productivity of employees and the business overall. When enabling business applications on devices, performance becomes especially critical.

      View this video to hear more on the impact of BYOD on the networks and hear more on:

      - How should wireless networks be designed to support the transition from 2.4GHz to 5GHz devices?
      - How does device optimization work in a BYOD environment, with a myriad of unique mobile devices hitting a WiFi network unpredictably?

      Read more >
    • Mobile Security You Need with BYOD Your Employees Love Mobile Security You Need with BYOD Your Employees Love Carlos Montero-Luque, Chief Technology Officer at Apperian Recorded: Aug 5 2014 4:00 pm UTC 32 mins
    • Gartner predicts that by 2017 more than 50% of companies will have implemented a BYOD (bring your own device) program. Whether you already have BYOD, or are planning for your BYOD future, security is likely one of your top concerns. Fortunately, when done right BYOD can increase employee productivity and workforce satisfaction while maintaining the security you need.

      Unfortunately, many companies often struggle by implementing BYOD policies that are too intrusive to end-user’s personal devices. The business results and security benefits are lost altogether.

      In this webinar you will learn how focusing on business apps and data can drive the mobile security you need with the BYOD your employees love.

      Carlos Montero-Luque, Chief Technology Officer at Apperian will reveal:

      • Why focusing on the true end-point of mobility, the apps and data, is the best approach to create a secure BYOD environment
      • How a zero-touch, non-intrusive BYOD security approach increases employee productivity
      • What practical steps you can take to simplify the complexity of supporting multiple devices, operating systems, and contingent workforce BYOD environments.

      Read more >
    • Never Worry About Managing BYOD Again! Never Worry About Managing BYOD Again! Lanny Gray, SVP Sales, Nuvestack Recorded: Mar 5 2015 9:00 pm UTC 44 mins
    • Business computing is changing before our eyes. Physical PCs and servers cannot keep pace with the mobile workforces of today or tomorrow. BYOD (Bring Your Own Device) is no longer a “nice to have”, it is a “must have”. The problem most companies face is providing secure and controllable access – anytime, anywhere – to the data, applications, tools and resources required to maintain an enterprise network. DaaS is quickly becoming the leading solution for companies to adopt a comprehensive BYOD policy while actually increasing security and ubiquitous access. Join Nuvestack, the leader in DaaS technology, for an informative and insightful look at what it really takes to implement and manage DaaS as a BYOD strategy.

      Read more >
    • BYOD 101: Avoid the 5 Most Common Mistakes BYOD 101: Avoid the 5 Most Common Mistakes Tom Murphy, CMO, Bradford Networks Recorded: Mar 26 2015 5:00 pm UTC 33 mins
    • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

      Attend this webinar and you will learn how to avoid:
      • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
      • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
      • User Frustration - Implement ultra flexible BYOD policies without compromising security
      • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
      • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant

      Read more >