Hi [[ session.user.profile.firstName ]]

To BYOD or Not to Be: Protecting Mobile Data

Mobility is great for your business, right? Employees can be much more productive, anywhere, at any time! But as you consider a ‘Bring Your Own Device’ (BYOD) program for your employees, you need to consider the risk to your business data and applications. Mobile devices are fast becoming the new ve
Mobility is great for your business, right? Employees can be much more productive, anywhere, at any time! But as you consider a ‘Bring Your Own Device’ (BYOD) program for your employees, you need to consider the risk to your business data and applications. Mobile devices are fast becoming the new vector for malware, interception and compromise, as reported in our recent research reports. What if the wireless access point an employee connects to at the local coffee shop is actually a rogue access point? And, what happens if one of your employees loses a smartphone or tablet, or even worse, it is stolen? What about that business e-mail and sensitive document, or mobile login for your business applications. Is that information safe? This session examines how to ensure that your employees’ personal or business mobile devices are safe and protected, while allowing you to reap the productivity gains offered by BYOD.
Recorded Sep 12 2012
52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Gajraj Singh, Director of Product Marketing
Presentation preview: To BYOD or Not to Be: Protecting Mobile Data
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: To BYOD or Not to Be: Protecting Mobile Data
  • Live at: Sep 12 2012 2:00 pm
  • Presented by: Gajraj Singh, Director of Product Marketing
  • From:
Your email has been sent.
or close
You must be logged in to email this