Hi {{ session.user.profile.firstName }}

To BYOD or Not to Be: Protecting Mobile Data

Manage webcast
Gajraj Singh, Director of Product Marketing
Mobility is great for your business, right? Employees can be much more productive, anywhere, at any time! But as you consider a ‘Bring Your Own Device’ (BYOD) program for your employees, you need to consider the risk to your business data and applications. Mobile devices are fast becoming the new vector for malware, interception and compromise, as reported in our recent research reports. What if the wireless access point an employee connects to at the local coffee shop is actually a rogue access point? And, what happens if one of your employees loses a smartphone or tablet, or even worse, it is stolen? What about that business e-mail and sensitive document, or mobile login for your business applications. Is that information safe? This session examines how to ensure that your employees’ personal or business mobile devices are safe and protected, while allowing you to reap the productivity gains offered by BYOD.
Sep 12 2012
52 mins
To BYOD or Not to Be: Protecting Mobile Data
More from this community:

Network Infrastructure

  • Date
  • Rating
  • Views
  • Join us on Friday, August 28 for a live online demo. Learn how RingCentral supports your mobile workforce with powerful communications that work on the desktop, desk phone, smartphone, and tablet, making everyone productive and professional no matter where they are.

    Understand how cloud-based solutions overcome many of the limitations of legacy PBX systems and make a BYOD environment easier and less costly to manage. See a demo of our powerful mobile app that lets you take HD voice, fax, text, online meetings, conferencing and more with you anywhere on your smart devices.

    You’ll see how it works and get answers to your questions. Learn how to:
    •Call, text, or fax anyone, anytime from your mobile app with Company Directory
    •Use a single business identity with one business number.
    •Manage your entire system of locations, departments, extensions, and direct numbers
    •Use advanced call control for call flip, transfer, park, recording, and more.
  • Health plans push for their members to visit their primary care provider for a checkup. It improves health outcomes and reduces the medical spend from costs related to illness and disease. Like their members, health plans also need checkups that will identify the challenges to which they are increasingly exposed, such as issues around information security, revenue maximization, and staffing needs. In this webinar, we will discuss how to specifically deal with key issues related to each of these areas.
  • Today and in the future, Carrier Ethernet (CE) 2.0 will support the automated provisioning of dynamic cloud-based services through NFV and SDN as outlined in MEF’s Third Network vision and Lifecycle Service Orchestration strategy. The MEF’s Professional Certification Program is evolving to keep pace with these rapid developments in our industry.

    This webinar will cover two key topics. It will introduce the new MEF C3 Professional Certification program and cover the terminology and concepts of Service Architecture, Connectivity Services, Lifecycle Frameworks and Lifecycle Orchestration. In addition, it will reveal why it is critical to fully understand how to deploy those CE service attributes necessary to support agile cloud services, which are covered in the current MEF-CECP exam.

    This webinar is intended for individuals who plan, market, implement, deploy, operate and support CE services.
  • Wondering how to manage stringent SLA demands for complex networks that span distributed and mainframe environments, while simultaneously reducing your IT budget? Discover how you can dramatically improve performance and availability of your entire network by proactively managing it from a single point of control. What’s more, you’ll find out how to significantly reduce costs with total savings that might surprise you.

    See how customers are leveraging advance analytics and automation to predictably prevent network problems and resourcefully plan for future network needs.
  • In this webinar Sandra will discuss the newly announced Intel® Network Builders Fast Track. This is the company’s next step in working with the networking industry to accelerate innovation in the network ecosystem. Through a combination of market development activities and Intel Capital investments Intel plans to help drive integration of solutions for deployment, accelerate interoperability across stack layers and across networks, and accelerate adoption of standards based technologies using Intel architecture with trials and deployments with industry leading service providers.

    Sandra will explain what areas Intel will invest in to help drive integration of solutions for deployment, ensure interoperability across stack layers and across networks, and accelerate optimization of standards based technologies using Intel architecture in areas such as NFV/SDN, 5G and mobile edge computing with the goal of creating a faster path to deployment. Sandra will also provide insight into the programs Intel may invest such as the Solution Blueprint Program to develop use cases, the Intel® Network Builders University to drive technical education for the ecosystem and the creation of interoperability centers for testing compliance, performance tuning and testing.
  • Omnichannel shopping and the Internet of Things are creating device proliferation and expanding the diversity of customer demands. Is your network ready?

    The converging wired and wireless worlds, along with best-in-breed cloud management applications, are offering ultimate network flexibility allowing for greater security, ease-of-management, and cost savings at the Edge.

    Join our webinar to discuss a direction for future-proofing your network platform with speaker and thought leader Ken Silay.

    Attendees will learn:
    •Trends and challenges in today’s network landscape
    •What are the elements of a future-proof network
    •What issues you need to consider to future-proof enterprise networks
    •How WAN Diversity is enabling IT productivity

    Who Should Attend?
    •Network Administrators/Engineers/Architects
    •CIO/CISO
    •IT Directors/Vice Presidents


    About Ken:
    Ken has held technology leadership positions throughout his career across multiple industries including retail, healthcare, consumer goods, medical devices and the United States military. He is as effective designing and implementing a strategy for corporate innovation as he is streamlining business process that yield hundreds of thousands of dollars in business and technology improvements. As problem solver and recognized thought leader, he is skilled at fusing analytic and creative thinking to deliver innovative solutions.

    Ken was selected as a 2015 Top Innovator by Retail Touch Points and Chairperson for the 2015 RIS News Technology Conference. Combining his technical education with solid people and business management experience he has forged effective partnerships to deliver large-scale projects and technical process improvements. He believes in leadership by example and is a trusted mentor. Ken is a change agent who would rather be the catalyst for change than the victim of it.
  • Test Kitchen makes it easy for you to test cookbooks on a variety of platforms. With Test Kitchen, you can quickly create test nodes, converge them, and then run tests against them to verify their state.

    Join Chef engineer Fletcher Nichol as he explains how to use Test Kitchen to write and maintain Chef cookbooks with confidence. Fletcher will discuss:

    - How to set up your workstation
    - How to create a new Chef cookbook that runs on your target platform
    - How to deal with new operating system and Chef client releases
    - How to play in the world of Windows
  • For most organizations in the IT world, the data center is their biggest investment—their most important piece of infrastructure. If you’re going to be spending millions of dollars on it, you want to make sure it does what you need it to do. In this Berk-Tek Advancing Network Resiliency webcast, you will learn the 5 things you need to consider when upgrading your data center. With the help of Berk-Tek and The TEK Center, you can be sure that your next upgrade will perform beyond expectations.

    Topics to be discussed include:
    -An update of the standards including TIA and IEEE
    -Migration path options
    -An overview of the testing being conducted in the TEK Center
  • Availability is one of the core principles in the security CIA triad and one which business leaders tend to grasp more so than other technical risks associated with security. Customers want and expect access to their finances anytime and from anywhere. How is the financial industry grappling with distributed denial of service (DDoS)? What is the financial impact to an institution under DDoS attack? Are financial services firms witnessing an increase in DDoS attacks and duration? If so, what countermeasures are in place to ensure availability does not suffer?

    Lastly, what is the financial services industry relying on as sources of intelligence?

    Join us to hear answers to these questions and more as IANS Research and Arbor Networks present poll results from financial services’ security executive management surveyed.
  • Data security has never been more paramount. In this webinar IGX Global will give you insight into how you can streamline management of remote access users, while at the same time improving security, and giving the users a high degree of privacy.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: To BYOD or Not to Be: Protecting Mobile Data
  • Live at: Sep 12 2012 2:00 pm
  • Presented by: Gajraj Singh, Director of Product Marketing
  • From:
Your email has been sent.
or close
You must be logged in to email this