Mobile Device Strategies: Improve Productivity without the Risk

Laurie Menear, Head of Research, Company85
Practical advice for senior IT and information security heads on managing mobile device security, including bring-your-own-device (BYOD). This presentation covers security governance, compliance, policy implementation and user education. The webinar also shares how one innovative UK firm has taken advantage of consumer devices and is protecting itself against uncontrolled use.

Laurie Menear is Head of Research & Marketing at Company85. He has over 25 years’ experience with technology firms, much of which has been spent developing programmes in partnership with companies like Sun Microsystems, HP, Microsoft, Oracle and Symantec. He is a strong advocate of using collaborative approaches to address business issues.
Oct 17 2012
40 mins
Mobile Device Strategies: Improve Productivity without the Risk
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4527)
  • Upcoming (156)
  • Date
  • Rating
  • Views
  • Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Channel
  • Channel profile
Up Down
  • About Company85 Recorded: Mar 14 2013 5 mins
    Company85 is a young IT consulting firm specialising in IT transformation, cyber security and storage/backup.

    Here, some of our people talk about what Company85 means to them.

    The video is primarily a roundup of progress during Company85's first two years, to the end of 2012 when it won the UK IT Award for Best Small Supplier.
  • Mobile Device Strategies: Improve Productivity without the Risk Recorded: Oct 17 2012 40 mins
    Practical advice for senior IT and information security heads on managing mobile device security, including bring-your-own-device (BYOD). This presentation covers security governance, compliance, policy implementation and user education. The webinar also shares how one innovative UK firm has taken advantage of consumer devices and is protecting itself against uncontrolled use.

    Laurie Menear is Head of Research & Marketing at Company85. He has over 25 years’ experience with technology firms, much of which has been spent developing programmes in partnership with companies like Sun Microsystems, HP, Microsoft, Oracle and Symantec. He is a strong advocate of using collaborative approaches to address business issues.
  • Bring Your Own Device: User Education Recorded: Sep 17 2012 3 mins
    A 2-minute lighthearted look at our top five tips for users to keep your business secure. For more information and advice on BYOD security strategy visit www.company85.com/byod
  • Company85 on cloud computing security Recorded: Jun 12 2012 5 mins
    Company85, has published a 4-minute video and associated white paper on implementing secure cloud services. The video discusses high level questions affecting organisations moving enterprise data and applications into the cloud, while the white paper goes into further detail, combining independent, product-agnostic guidance with advice on identifying quick wins.
Independent advice on cyber security and IT transformation
Company85 are independent experts in cyber security, IT transformation and storage/backup. The firm provides agnostic advisory and project services to private and public sector organisations.

Headquartered in London, Company85 delivers projects in the UK and internationally in Europe, Africa and the Middle East. Its unique blend of expertise in security, optimisation, consolidation and managed services is backed up with a strong heritage, the exceptional pedigree of its people, and the referenceability and quality of its client and partner relationships.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Mobile Device Strategies: Improve Productivity without the Risk
  • Live at: Oct 17 2012 9:00 am
  • Presented by: Laurie Menear, Head of Research, Company85
  • From:
Your email has been sent.
or close
You must be logged in to email this