Hi [[ session.user.profile.firstName ]]

Choose-Your-Own-Device: BYOD Without Security, Governance and Compliance Risks

There's been a lot of talk the past few years about BYOD/PC and how IT has to embrace it to stay competitive. But, BYO can be very complex to implement -- there are legal issues regarding privacy, IP security issues, and of course issues of on-boarding and off-boarding employees using a multiplicity of devices from remote locations.

Why not start simply with a CYOD/PC program instead? It provides the employees access to some of the cool toys they want but IT can still maintain ownership, security, and overall management. In this informative video, learn how to implement a highly cost effective and secure CYOD/PC program.
Recorded Sep 17 2014 7 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ian McWilton and Kimber Spradlin, Moka5
Presentation preview: Choose-Your-Own-Device: BYOD Without Security, Governance and Compliance Risks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cloud-based Computing Survey Results: Adoption Trends and Security Concerns Recorded: Mar 25 2015 7 mins
    Kris Bondi, VP of Marketing, Moka5
    Earlier this year, Moka5 conducted a survey about how enterprises are currently using cloud-based services and how they would prefer to use them. The results are in and the findings are eye opening. Join Moka5 VP of Marketing Kris Bondi for an overview of the adoption and usage trends as well top-of-mind security concerns for IT decision makers.
  • Achieving BYOx Security and Manageability with Containerization Recorded: Dec 10 2014 25 mins
    Ian McWilton, Chief Architect, Moka5
    Containerization has enabled secure BYOD programs for mobile and tablets. If the same could be done for the humble PC, IT could get out of the laptop business and save money. What if you could enable containerization on PC’s in a way that ensures security and manageability, while enabling new use cases like BYOPC contractor, Joint ventures, BYOPC employee, Mergers and Acquisition and many more?

    In this session, learn how to secure virtual containers on an unmanaged PC, as well as how the new class of ‘enterprise consumer’ is changing the nature of the enterprise perimeter and the right way forward for the next decade of enterprise IT.
  • VDI: Server-side vs. Client-side Virtualization Recorded: Sep 17 2014 4 mins
    John Whaley, CTO, Moka5
    Although VDI has been touted as the most economical, efficient way to manage desktop, server-side solutions pose serious drawbacks—including massive infrastructure investment, huge data-center power bills, and the need for ample bandwidth and high Internet speeds.

    Unlike server-side VDI, client-side virtualization runs images from central servers connected to desktops via a remote desktop protocol. This allows for central management, while executing on the local device itself.

    In this video, learn the benefits and drawbacks of client-side VDI, as well as the pros and cons of server-side VDI.
  • Choose-Your-Own-Device: BYOD Without Security, Governance and Compliance Risks Recorded: Sep 17 2014 7 mins
    Ian McWilton and Kimber Spradlin, Moka5
    There's been a lot of talk the past few years about BYOD/PC and how IT has to embrace it to stay competitive. But, BYO can be very complex to implement -- there are legal issues regarding privacy, IP security issues, and of course issues of on-boarding and off-boarding employees using a multiplicity of devices from remote locations.

    Why not start simply with a CYOD/PC program instead? It provides the employees access to some of the cool toys they want but IT can still maintain ownership, security, and overall management. In this informative video, learn how to implement a highly cost effective and secure CYOD/PC program.
  • Preserving and Securing Windows XP with Client-side Desktop Virtualization Recorded: Aug 8 2014 28 mins
    Ian McWilton, Chief Solutions Architect; Kimber Spradlin, Sr. Director Products, Moka5
    With Microsoft ending support of Windows XP in April of 2014, security and access to business-critical applications are on top of mind of every IT professional. Technologies like client-side desktop virtualization, with minimal back-end infrastructure and quick deployments, help organizations migrate to Microsoft's more recent operating systems when they're absolutely ready.

    Join this webinar to learn:
    - How a containerization strategy enables users to move forward with Windows 7 or 8.1 and still access business-critical XP apps
    - Best Practices in XP security after end of support
    - Methods for maintaining legacy XP apps
    - Real-world case studies and Q&A
  • Strategies for Improving Regulatory Compliance and Security Recorded: Aug 7 2014 10 mins
    Kimber Spradlin, CISSP, CISA, Sr. Director of Product Marketing, Moka5
    Even though IT regulations have been in place since the 1990s, organizations continue to struggle with their implications and remaining compliant. The regulations require companies to have good security but lack specifications regarding exactly HOW this good security is supposed to be implemented.

    Companies are now turning to other compliance standards organizations for best practice guidelines and certification. These provide guidance regarding physical security, employees and education, but still lack specifics when it comes to configuration.

    In this video, Kimber Spradlin, CISSP, CISA, Sr. Director of Product at Moka5 how organizations are attempting to comply with multiple regulations and what they can do to improve their compliance.
  • What The Vendors Don’t Tell You About Desktop Virtualization Recorded: Jul 17 2014 46 mins
    John Whaley, Founder and CTO, Moka5
    Desktop virtualization holds the promise of easier desktop management, better security, reduced costs, and the ability to move to new ownership models like BYOD. Or at least that is what the vendors tell you. This webinar will describe what you can actually expect from a desktop virtualization deployment. We will describe the different desktop virtualization architectures and their pros and cons. We will also cover the top five reasons desktop virtualization projects fail, and what you can do to ensure your desktop virtualization project will be successful.
Moka5
Moka5

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Choose-Your-Own-Device: BYOD Without Security, Governance and Compliance Risks
  • Live at: Sep 17 2014 8:45 pm
  • Presented by: Ian McWilton and Kimber Spradlin, Moka5
  • From:
Your email has been sent.
or close