Rethinking Mobile Security

Presented by

Brian Tokuyoshi, Senior Solutions Analyst, Palo Alto Networks

About this talk

For the enterprise, the top priority for mobile security is protecting corporate data. InformationWeek noted in the 2014 Mobile Security Survey that 72% of organizations are concerned about data loss. These concerns are especially pertinent in light of the rapid adoption of BYOD policies, and the formidable advances in mobile threats. Today, we are finding new samples of mobile malware every 20 minutes on enterprise networks. Many companies are not prepared to address these changes in the threat spectrum, and are rethinking what must be done about mobile security. To date, many companies try to secure mobile devices by using device management to restrict or remove potentially risky functionality. However, these approaches impair, rather than enable, the company’s ability to deploy more sophisticated apps, and often create hardships on the user. In this session, we discuss the changing threat landscape for mobile platforms, and how this drives a corresponding set of new requirements for security. Instead of being shackled to past principles and philosophies, learn about approaches to security that enable and extend (rather than restrict) access to mobile computing.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13398)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more