Surviving the Mobile Device Invasion – When Mobile Tries to Connect to IT

Presented by

Cameron Camp, ESET

About this talk

With the deluge of new mobile smartphones like Android, iPhone, and others hitting the streets, there are thousands of new attack vectors against a company's IT infrastructure that create potential security nightmares. When users download apps by the droves and then want to connect to core critical infrastructure, how should IT handle it? While there is a drive for increased off-hours and/or offsite productivity using mobiles, can we stomach the changes that are coming, and can our organizations remain (or become) secure?

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (20)
Subscribers (134)
Threats are evolving by the second. It's no longer just about viruses. Spyware, trojans, worms, rootkits, bots and phishing attacks are all on the rise. Malware writers are constantly reworking their code to evade security defenses. The ESET Channel features resources to understand the nature of these evolving threats, their impact on your business, and why proactive protection is so important.