Hi [[ session.user.profile.firstName ]]

Android Enterprise with ZENworks 2017 Deep Dive - Part 1

Do you know how Android Enterprise device management works in ZENworks? What a Work-Profile is? How you can manage a company-owned Android device? Join us for this session where ZENworks architects take you behind the scenes of what’s actually happening during Android Enterprise enrollment with Google, how you enroll an Android device, how Apps get distributed, how you can enforce compliance with corporate security policy and control various device configurations.
Recorded Jan 16 2019 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Vikram Derebail and Madhusudan C, Micro Focus
Presentation preview: Android Enterprise with ZENworks 2017 Deep Dive - Part 1

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Best Practices for taking control of privilege in your organization Oct 31 2019 3:00 pm UTC 60 mins
    Andras Cser, VP, Principal Analyst, Forrester and Tim Sedlack, Director of Product Management, Micro Focus
    Experts estimate that as many as half of all security breaches occur as the result of abused privileged credentials. Whether the privilege misuse occurs due to employee carelessness or is the work of a cyber-criminal who has leveraged the credentials of an insider to gain access to your IT network, you can best manage this risk by closely controlling and monitoring all privileged access.

    In this webcast, Andras Cser, VP, Principal Analyst with Forrester and Tim Sedlack of Micro Focus will discuss best practices for taking control of privileged access in your organization and why it’s increasingly important to discover and monitor privileged entitlements – wherever they live.
  • The Hidden Business Enabler - Advanced Authentication Recorded: Oct 1 2019 59 mins
    Andras Cser, VP, Principal Analyst, Forrester, Kent Purdy, Product Marketing & Troy Drewry, Sr Product Mgr, Micro Focus
    Whether businesses are seeking to protect themselves from outsiders or simply complying with government mandates, identity verification continues to be a cat and mouse game between taking on risk and the security guarding against it. Yet it’s often their tactical view that limits the business’s ability to use their security investment to their full advantage.

    In this webcast, Andras Cser, VP, Principal Analyst with Forrester and Kent Purdy & Troy Drewry of Micro Focus look through the lens of business enablers at why maximizing your authentication flexibility is a best-practice approach to empower your organization.
  • The Pulse of AppSec: 2019 Trends and Insights Recorded: Sep 25 2019 62 mins
    Alex Hoole, Micro Focus
    Attacks targeting the application layer are on the rise. The 2019 Application Security Risk Report by the Micro Focus Fortify Software Security Research team covers the industry trends and insights in the application security landscape.

    Fortify on Demand analysis shows broad vulnerability in apps. 4 out of 5 tested web applications had at least one critical or high severity issue. Furthermore, 61% of tested apps had critical or high vulnerabilities not covered by the OWASP Top 10 2017.

    In this webinar, we share results from our research:
    • The attacks to watch out for in 2019
    • How effective are the controls for application layer vulnerabilities?
    • Privacy, Policy, and Standards
    • Vulnerabilities in Open Source Dependencies
    • Best practices to protect your business

    Join us for the key takeaways of the 2019 Application Security Risk Report.
  • The Role of Data Protection in Unified Endpoint Management Protection Recorded: Sep 24 2019 59 mins
    Ed Gavin, Micro Focus
    According to Verizon’s Mobility Security Index 2019, 83% of those surveyed indicated that their organization was at risk from mobile threats. In the same report, 67% companies said their defenses aren’t keeping pace. As the exposure increases with the continuing rise of mobile workforce, it is critical to adopt a comprehensive approach to mitigate the risk. Now, the new Micro Focus Unified Endpoint Management (UEM) Data Protection solution makes it simple for ZENworks customers to add data protection to their defense against attacks such as ransomware and data losses. Please join Ed Gavin, Head of Micro Focus Endpoint Data Protection, and learn:

    • What is UEMP?
    • Why is data protection necessary in UEMP ?
    • What are Micro Focus’ proven data protection capabilities and benefits?
    • How simple is it to deploy into the ZENWorks environment?
    • Are there flexible deployment options?
    • What upgrade promotions are currently available?
  • Five steps to implement a universal policy strategy Recorded: Jul 18 2019 60 mins
    Lacy Gruen, Tim Sedlack and Danny Kim, Micro Focus
    Most organizations manage policies in silos across their organization. Even those managing group policy within Active Directory find it very difficult to effectively leverage those authorization and authentication policies in other systems. All systems within your environment require some kind of policy controls to be enforced and auditable – from Linux and UNIX servers to a wide variety of cloud resources such as virtual machines, SaaS, containers, etc. It becomes even more challenging when you must prepare your existing security policies for the cloud and find a way to migrate them to cloud services such as Intune. Managing policy in so many different places is highly inefficient and the lack of consistency opens the organization up to a great amount of risk. Bad actors are just waiting to find vulnerabilities when it comes to security policy and will exploit any gaps every chance they get.

    Attend this webinar to learn how to transform the way you manage security policies to improve security, drive efficiency, and reduce the risk of a breach or failed audit. Industry experts Tim Sedlack and Danny Kim will discuss the five steps you can take to implement a modern universal policy strategy.
  • Machine learning in cybersecurity: One size doesn't fit all Recorded: Jun 3 2019 48 mins
    Mario Daigle, VP of Product for Interset (a Micro Focus company)
    Machine learning (ML) is one of today's "must-have" cybersecurity technologies, but is it really able to address every challenge equally? Solving real problems is more important than buying the "best" technology, and you don't need to be a data scientist to figure out the most critical problems that you need to solve. You simply need to understand that different types of ML solve different problems and ask the right questions to determine the right tool for the job at hand.

    Join Mario Daigle, VP of Product for Interset, a Micro Focus company, to discuss two main categories of machine learning—supervised and unsupervised—and how they can be applied practically in the context of solving cybersecurity problems.
  • Optimizing and Maturing an AppSec Program Recorded: May 21 2019 60 mins
    William Hernandez, Stan Wisseman and Brent Jenkins, Micro Focus
    Many organizations turn to the guidance provided by the OWASP Top 10 for their application security programs. While this is a great way to get started, a more mature and optimized program is needed to avoid being the next headline. Over 60% of applications tested by our software security research team last year had one or more critical or high-severity security flaw NOT covered by the OWASP Top 10. Organizations that only test or mitigate security risks found within these Top 10 are still very vulnerable to attacks. In this webinar, we discuss steps to take to mature your application security program, along with some success stories of companies that have done this with the help of Micro Focus Fortify.
  • Micro Focus SecOps Innovation: A look into the future of security insights Recorded: May 15 2019 59 mins
    Mark Fernandes, Accenture; Mario Daigle, Interset; Charles Clawson and Michael Mychalczuk, ArcSight, Micro Focus
    ArcSight has a long, storied history of protecting the world’s leading enterprises through enabling clear and comprehensive insights that help reduce damaging security breaches. Yet with modern digital transformation comes new challenges and threats. How do enterprises reduce complexity at a time of massive data explosion, scale to address a global range of threats and new application requirements, and reduce resource-intensive operations through greater efficiency by doing more with less?

    Hear from product and solution leaders about the core capabilities required for successful SecOps within a modern IT landscape, including the latest innovations to support today’s enterprise digital transformation roadmaps. Micro Focus is joined by Accenture with customer success examples learned on their customer transformation journeys. This overview also includes an introduction to Interset for UEBA, Micro Focus’ newest acquisition, enabling advanced analytics for anomaly detection enabling Micro Focus to help its customers advance the next generation of security operations.

    Join us for this webinar to learn more about:

    • Achieving comprehensive security insights with reduced complexity at greater scale
    • A roadmap designed to address enterprise digital transformation with SecOps
    • Customer success and updates from Accenture with insights from real-world use cases
    • Advances with current and planned SIEM, threat hunting and user behavior analytics capabilities
  • Privacy and Data Protection Recorded: May 13 2019 38 mins
    Manju Lal, Cyber & Data Privacy Practice, PwC and Nathan Turajski, Security, Risk and Governance Solutions, Micro Focus
    With an increasing number of data breaches and mis-use of personal information incidence, organizations are increasingly challenged with protecting individual data privacy and maintaining public trust in this data-driven society. In addition, companies are facing a growing number of new security, privacy and data protection laws across the globe, such as GDPR, CCPA, LGPD, HIPAA, GLBA, etc. This webinar addresses the challenges organizations face in information security and data privacy, and PwC's point of view and approach to transform their privacy and data management programs. Leveraging Micro Focus' security and information management software and PwC's advisory services, organizations will benefit from a holistic end-to-end approach and technology solution to manage cybersecurity and privacy risks.
  • Fitting Security Into Your Software Lifecycle: Automation and Integration Recorded: Apr 17 2019 39 mins
    Michelle Duffy, Sonatype; Dennis Hurst, Saltworks; Jimmy Rabon and Brent Jenkins, Micro Focus
    One of the biggest challenges in Application Security programs is the friction it causes between other teams due to the idea that security slows down speed and innovation. Business goals are to generate revenue with product and feature releases. In order for businesses to stay competitive, they can’t slow down innovation. Because of this, a fundamental principle of application security is to build security into your way of thinking and operating. In this webinar, we are joined by Sonatype and Saltworks to discuss how to accomplish this fundamental principle by leveraging key integrations and automation.
  • Ensure Privacy Protection Through Your Digital Transformation Recorded: Mar 27 2019 50 mins
    Carole Murphy, Product Marketing, Data Security – Voltage & Becky Arenson, Solutions Marketing, Data Security, Micro Focus
    Privacy represents a major challenge for the modern enterprise. The flexibility of hybrid IT and insights of data analytics are essential to business. But the digital transformation that is key to business success and competitive advantage is also a major vulnerability when it comes to data privacy.

    Organizations are rightfully concerned about CCPA, GDPR, PIPEDA, and the growing number of regulations now being enacted means they need to figure out how to reduce their risk. But current privacy protection approaches fall short. What’s needed is a unified technology framework that lets you take a holistic, analytics-driven approach to securing what matters most—a framework flexible enough to meet the needs of your enterprise, but specific enough to offer a guide to risk reduction.

    Join us for this webinar, to learn about:

    • The attributes of a flexible, unified framework to address disparate regulations
    • Five critical technology capabilities to enable compliance
    • Data discovery and classification to manage risk
    • Governing identity privileges, access, and stores
  • Close the gap in your ransomware defense Recorded: Mar 21 2019 32 mins
    Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro Focus
    Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.

    Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.

    Join this webinar to learn about:

    • Ransomware challenges and impact
    • Why malware detection alone is not enough
    • How to close the gap with holistic endpoint data and device management
  • Risk Assessment with Secure Content Management Recorded: Feb 28 2019 12 mins
    Jonathan Clark, Product Marketing Manager, Secure Content Management, Micro Focus
    Implementing a holistic and integrated approach to minimize your exposure to risk makes good business sense. The Secure Content Management suite integrates file analysis, structured data management and policy-based governance to help you identify, analyze, manage, and retain both unstructured and structured data across the lifecycle.

    In this session we cover:
    • Data Discovery for all content types
    • Unstructured Data file analysis and Structured Data file analysis
    • Architectural requirements to support the legal policy and compliance procedure
    • The regulatory challenges for Data management
    • How the application and enforcement of policies to manage information throughout its lifecycle can be achieved using the Micro Focus Secure Content Management suite
  • 6 Part series - Breach Defense: Part 1 - Anatomy of a Breach Recorded: Feb 26 2019 49 mins
    Robert MacDonald, Micro Focus
    Cyber breaches have almost doubled in the past five years, according to the World Economic Forum, which now lists cyberattacks as third on its list of top global risks. But how can organizations keep pace, keep secure? There needs to be a plan! One of the clearest, most comprehensive, most flexible, and most highly-regarded methods we’ve found to approach cybersecurity is the framework devised by the National Institute of Standards and Technology (NIST).

    This webinar provides an overview of market trends facing organizations as they venture into a digital transformation. We will review how organizations can make their digital transformation secure by employing the NIST framework and ways they can to use it to strengthen every facet of their organization’s defenses against a breach.
  • Privacy: An Introduction to Data Protection and Identity Management Recorded: Feb 26 2019 11 mins
    Nathan Turajski, Director Product Marketing, Security Operations and Data Security, Micro Focus
    To help enterprises achieve an end-to-end solution that scales to meet modern privacy mandates such as GDPR, the California Consumer Privacy Act, and beyond, Micro Focus brings together comprehensive technology portfolios. This overview includes Secure Content Management for data discovery and classification; Identity and Access Management to capture and enforce user rights for safe access to sensitive data through identity governance; and Data Security for applying data-centric protection through innovative format-preserving encryption. The flexible solution supports a wide range of use cases to meet organizational maturity needs through a modular approach that grows along with your organization—learn more!
  • Get Started with Seamless AppSec in One Day Recorded: Feb 13 2019 48 mins
    Brent Jenkins and Harley Adams, Micro Focus
    With software becoming the competitive differentiator for most businesses rather than just a support function, the speed and complexity of it is rapidly increasing. Because of the business demand being put on development teams, often times there is little to no time put into ensuring these applications are secure. However, the biggest and most severe data breaches that have affected both the public and private sectors all operate at the application layer.

    Ensuring your applications are secure doesn’t have to be a cumbersome process, though. With the right program and tools, you can improve or start your organization’s security initiative without getting in the way of developers’ productivity. In this webinar, we will cover:

    • The current state of software and application security
    • How to create or improve your AppSec program in a day
    • Why integration is essential for speed
    • Why it is essential to go beyond the OWASP Top 10
  • Discover, protect, and control access to data to lower privacy risk Recorded: Feb 12 2019 17 mins
    Nathan Turajski, Director Product Marketing, Security Operations and Data Security, Micro Focus
    Ensuring the privacy of your customer information and IP is critical for protecting the lifeblood of your enterprise. But where to start? Micro Focus offers a comprehensive framework approach that maps products and technologies to each phase of your strategy. Whether just starting out with data discovery and classification to determine your risk, or if ready to apply controls and audit compliance, our security, risk and governance solutions scale to your needs, each step of the way. Begin to unlock new business value safely when data is trusted in the hands of appropriate users and applications, while lowering risk of abuse or loss. This privacy solution overview will illustrate how you can begin your journey!
  • Android Enterprise with ZENworks 2017 Deep Dive - Part 2 Recorded: Jan 17 2019 61 mins
    Vikram Derebail and Madhusudan C, Micro Focus
    Do you know how Android Enterprise device management works in ZENworks? What a Work-Profile is? How you can manage a company-owned Android device? Join us for this session where ZENworks architects take you behind the scenes of what’s actually happening during Android Enterprise enrollment with Google, how you enroll an Android device, how Apps get distributed, how you can enforce compliance with corporate security policy and control various device configurations.
  • Android Enterprise with ZENworks 2017 Deep Dive - Part 1 Recorded: Jan 16 2019 59 mins
    Vikram Derebail and Madhusudan C, Micro Focus
    Do you know how Android Enterprise device management works in ZENworks? What a Work-Profile is? How you can manage a company-owned Android device? Join us for this session where ZENworks architects take you behind the scenes of what’s actually happening during Android Enterprise enrollment with Google, how you enroll an Android device, how Apps get distributed, how you can enforce compliance with corporate security policy and control various device configurations.
  • What’s new in ZENworks 2017 Update 4 Recorded: Jan 15 2019 61 mins
    Vikram Goyal, Vikram Derebail and Darrin VandenBos, Micro Focus
    Join UEM Product Management team for this session and see how ZENworks 2017 Update 4 furthers your ability to manage mobile devices better and the improved client management capabilities. Learn more on the latest mobile device control settings, ability to distribute Wi-Fi configurations on iOS and Android devices, Enterprise iOS Apps, mobile hardware inventory, locate a Windows 10 device, install schedules in bundles, updated application & storage device control in ZESM and much more.
Leading Security, Risk and Governance Platform
With the industry’s broadest set of integrated Security, Risk, and Governance solutions, combined with deep domain expertise and industry-leading analytics, Micro Focus is uniquely suited to help organizations take a holistic approach to protecting identities, apps, and data. Very few vendors can assure security and governance professionals that they are protecting against breaches, guarding the privacy of individuals and their data, and complying with regulatory and jurisdictional regulations – at scale, with ease, insight and confidence. Visit Micro Focus Security, Risk, & Governance at: https://www.microfocus.com/en-us/trend/security-risk-governance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Android Enterprise with ZENworks 2017 Deep Dive - Part 1
  • Live at: Jan 16 2019 6:00 pm
  • Presented by: Vikram Derebail and Madhusudan C, Micro Focus
  • From:
Your email has been sent.
or close