To BYOD or Not to Be: Protecting Mobile Data

Gajraj Singh, Director of Product Marketing
Mobility is great for your business, right? Employees can be much more productive, anywhere, at any time! But as you consider a ‘Bring Your Own Device’ (BYOD) program for your employees, you need to consider the risk to your business data and applications. Mobile devices are fast becoming the new vector for malware, interception and compromise, as reported in our recent research reports. What if the wireless access point an employee connects to at the local coffee shop is actually a rogue access point? And, what happens if one of your employees loses a smartphone or tablet, or even worse, it is stolen? What about that business e-mail and sensitive document, or mobile login for your business applications. Is that information safe? This session examines how to ensure that your employees’ personal or business mobile devices are safe and protected, while allowing you to reap the productivity gains offered by BYOD.
Sep 12 2012
52 mins
To BYOD or Not to Be: Protecting Mobile Data
Join us for this summit:
More from this community:

Network Infrastructure

Webinars and videos

  • Live 1 and recorded (935)
  • Upcoming (40)
  • Date
  • Rating
  • Views
  • Presented by the experts with the facts.

    The Inside Story of the Discovery, the Timeline and Solutions to Protect Your Organization. Finally, All of Your Questions Answered.

    Join the conversation and get the latest Heartbleed updates by following @CodenomiconLTD
  • 85% of enterprises permit BYOD, but only 25-30% of them actually have policies and technology to manage these devices. What is your business doing to ensure that the content on that device stays secure, regardless of what device your employees are using? If you are considering moving to a BYOD strategy or are in the midst of doing so, join this webinar to learn how to develop and execute a BYOD plan in your company. We'll talk about major challenges from creating a BYOD strategy and best practices from ensuring that the content on your device stays secure with Box.
  • The main purpose of fiber network monitoring is to allow operators to find faults and degradations before subscribers do! With the proper equipment, operators can quickly identify problems and send field technicians to the appropriate location to solve them. This is why the ideal network monitoring solution will leverage a geographic information system (GIS) to correlate the optical information with the geographical positioning.
    In this webinar, we will discuss:
    •The daily operations of field technicians
    •Establishing monitoring thresholds
    •Fault location on mapping tools
  • The future of work sees changes to how employees work, how managers lead, and how organizations are structured. However, technology still remains the central nervous system of organizations and things like enables flexible work, collaboration, communication, and BYOD. In short, IT helps organizations be competitive. But how is IT changing in the context of new work behaviors and expectations, a multi-generational workforce, the cloud, globalization, and many of the other trends that are shaping the world of work? Join us in this session as a panel of experts debates and explores how IT is changing and what the future of IT looks like.
  • Today’s Health IT leaders face a difficult task in handling mobile device security and policy compliance, particularly given the mobile transformation happening in healthcare today. Driven in part by the adoption of new care models like remote patient monitoring and telemedicine, and the Bring Your Own Device, or BYOD trend, the consumerization of IT is driving end-user demand for ubiquitous access – to networks, to clouds, to applications, to everything – from any device, anywhere at any time.

    In this webinar, we will highlight the challenges of mobile device security, management and policy today. We will consider the issues faced by Health IT teams when managing different operating systems across a myriad of devices, some of which are user-owned. Finally we’ll look at how Juniper Networks solutions address a broad spectrum of security and end-user experience issues, as we walk through a day in the life of a mobile clinician. Register now to attend!
  • Did you know that the majority of all web attacks occur at the website or web application layer? Can you see attackers threatening your public web applications right now?

    Join Juniper security experts, Pete McMullen & Ben Griffin for a 60 minute Junos WebApp Secure (JWAS) and Spotlight Secure overview and LIVE DEMO to learn how Juniper can protect your web assets from the largest Internet security threats known!
  • The multi-award winning PowerEdge VRTX now has even more amazing features packed into the extremely compact and amazingly quiet chassis.

    The Dell PowerEdge VRTX brings order to chaos, redefines IT operations and allows you to deploy performance anywhere.
    PowerEdge VRTX is a powerful, scalable, easy to manage solutions platform, optimized specifically for office environments. Clear up the complexity of disparate hardware, multiple management tools, and hardware sprawl with an optimized platform that integrates server nodes, storage, networking and management into a compact 5U chassis.

    Although initially designed with the express goal to deliver on the specialized needs of remote office/branch office (ROBO) environments the PowerEdge VRTX has found itself being deployed in a huge range of locations and solutions due to its power and flexibility.

    •Office-optimized dimensions, acoustics, and security
    •Virtualization-ready
    •Scalable, integrated shared storage to harness data explosion
    •Simplified systems management
    •Simplified networking to fit small business budgets
    •Highly available and easy to service
    •Flexible installation with both rack and standalone options.

    Join us to hear how VRTX and its new features could help you radically rethinking your organisations IT solutions. Get ready to be amazed by how powerful simplicity can be.
  • Fibre Channel (FC) has come a long way since its introduction to provide a networking solution that would provide the efficiency and speed necessary for storage to be networked and shared across multiple hosts. However, recently some have begun to question whether FC still has relevancy. The answer is a simple and definitive yes! It is all about the right technology for the job. Come and hear Ben Woo, Managing Director, Neuralytix, describe why Fibre Channel is the right tool for your job.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Channel
  • Channel profile
Up Down
  • Build the Best in Education with Juniper Networks Recorded: Jun 25 2013 41 mins
    Juniper Networks is in the business of network innovation. We believe the network is the single greatest vehicle for knowledge, understanding and human achievement the world has ever known. Juniper believes that learning settings must enable students and educators to analyze, communicate and collaborate globally to improve student outcomes that will impact our nation’s economy.

    In this webcast you will learn:

    •Key issues in Higher Education today
    •Higher Education technology trends
    •The role of the Network
    •Why Juniper Networks in Education

    Join Adaptive and Juniper for the “Build the Best in Education with Juniper Networks,” virtual event, presented by Oliver Schuermann, Director of Government, Education and Emerging Solutions at Juniper. In the presentation, Adaptive will present a customer case study from a recent deployment at Wesleyan University in Connecticut. The case study will detail the university’s decision to switch from their previous solution, and will also share the progress that has been made since implementing Juniper on their campus.
  • The Advanced Attacker is Not Scared of Your Security Recorded: Mar 20 2013 34 mins
    Hacking is a business and is organized to monetize the information that is stolen. Advanced attackers are well versed in methods to evade traditional signature and IP address based security products. On this webinar you will hear about advanced security techniques that change the economics of hacking back towards the organizations favor and how Juniper is leading the way in a new form of security - Counter Security.
  • Scott McKain "Ultimate Customer Experience" - Taxi Terry Story Recorded: Oct 11 2012 6 mins
    Adaptive Communications recently hosted internationally-recognized business expert Scott McKain, who delivered his "Ultimate Customer Experience" presentation. McKain shared his distinctive advice on creating compelling connections between you and your customers, and how to stand out and move up, regardless of the economic climate in the industry. Adaptive truly benefited from Scott's dynamic presentation and wanted to share one of his many examples of great customer service. Here, McKain shares his famous "Taxi Terry" story with one of his audiences.
  • To BYOD or Not to Be: Protecting Mobile Data Recorded: Sep 12 2012 52 mins
    Mobility is great for your business, right? Employees can be much more productive, anywhere, at any time! But as you consider a ‘Bring Your Own Device’ (BYOD) program for your employees, you need to consider the risk to your business data and applications. Mobile devices are fast becoming the new vector for malware, interception and compromise, as reported in our recent research reports. What if the wireless access point an employee connects to at the local coffee shop is actually a rogue access point? And, what happens if one of your employees loses a smartphone or tablet, or even worse, it is stolen? What about that business e-mail and sensitive document, or mobile login for your business applications. Is that information safe? This session examines how to ensure that your employees’ personal or business mobile devices are safe and protected, while allowing you to reap the productivity gains offered by BYOD.
  • Securing the Cloud with Juniper vGW Virtual Gateway Recorded: Jun 27 2012 33 mins
    When it comes to cloud computing, security has been one of the biggest inhibitors for businesses. While traditional security architectures (such as network-based firewalls and intrusion prevention system devices) are essential to the security of the physical network of the cloud, they provide no visibility into the traffic generated in the virtualized part of the network (e.g., traffic between virtual machines in the data center's host virtualization servers). To provide proper protections for the cloud, it is necessary to address the most significant underlying technology of the cloud: virtualization of workloads and servers.
    > And this is exactly what Juniper Networks vGW Virtual Gateway does. vGW is a comprehensive, hypervisor-based, virtualization security solution that was purpose-built for cloud environments. Join us to learn more about how vGW delivers total virtual data center protection and cloud security through visibility into the virtualized environment, multiple layers of protection, and a complete set of compliance tools-all things your customers will require with their move to the cloud.
  • Secure your Enterprise Mobility: Connect, Protect and Manage Recorded: May 16 2012 60 mins
    Bring your own (mobile) device, or BYOD, is a rising trend, and with good reason – the business benefits and the increase in employee effectiveness are too big to ignore. However, it’s all too easy to get bogged down in the details, like mobile OS versions, device types, location, allowed apps, etc. -- not to mention malware infection and jail breaking/rooting risks. This presentation will offer a strategic, or holistic, vision for BYOD that focuses on a new framework for successful deployment: connect, protect, and manage. The framework allows you to focus on the most important piece of your overall security strategy – policy – while controlling your risk and staying compliant. We will also discuss the relevance of some of the latest findings of our mobile threat center research.
  • Securing the Virtualized Data Center Webcast Recorded: Apr 19 2012 54 mins
    Securing the Virtualized Data Center Webcast
  • Securely Enable the Mobile Workforce Recorded: Apr 19 2012 2 mins
    What threats do mobile devices pose to your network?
Your Partner for Secure Solutions
Since 1997, Adaptive Communications has been committed to providing the best solutions to enterprise clients in the Eastern United States.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: To BYOD or Not to Be: Protecting Mobile Data
  • Live at: Sep 12 2012 2:00 pm
  • Presented by: Gajraj Singh, Director of Product Marketing
  • From:
Your email has been sent.
or close
You must be logged in to email this