Comparing Apples and Androids: The Enterprise Security Showdown

Lisa Phifer, President, Core Competence, Inc.
With Apple's iOS 6 and Google's Jelly Bean releases coming this fall, contention between these two powerful mobile platforms has never been hotter. According to Gartner, Android and iOS will capture 77% of open OS device sales by the end of 2012, further bolstering their presence in the workplace.

Despite considerable efforts to improve security and enterprise-friendliness, both mobile OSs come with some limitations and differences that require closer analysis. Join Fiberlink and special guest Lisa Phifer for our next webinar to learn about the features, policies and controls available on iOS vs. Android:

- Safe or Sorry? Learn security strides and shortcomings of each OS
- Know Your Limits: a realistic look at how much control you've been given
- Pop the hood and learn what separates an Apple iPad from a Samsung Galaxy Tab
Aug 27 2012
56 mins
Comparing Apples and Androids: The Enterprise Security Showdown
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4525)
  • Upcoming (153)
  • Date
  • Rating
  • Views
  • Modulo Director of Technical Services John Ambra walks Risk Manager users through the latest version 8.4, and answers user questions at the end.
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • Once upon a time, a knowledge worker accessed proprietary
    documents on a company-owned desktop computer within the corporate
    firewall. Today's work environment is dramatically different - sensitive
    data and proprietary documents are increasingly produced and accessed
    outside the firewall, on employee-owned devices. Virtual collaboration is
    growing, and the cloud is redefining security paradigms even further. Yet,
    some things remain the same. Intellectual property must be protected,
    regulations must be complied with, and individual identities,
    authentication and privileges must be dynamically managed. This panel will
    look at how changing use cases and scenarios are changing the threat
    landscape for corporate IP, and how leading vendors are rising to the
    occasion to help enterprises meet these challenges. It will also discuss
    best practices in developing and executing a forward-looking IP protection
    strategy.
  • Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Channel
  • Channel profile
Up Down
  • Wearable Tech Watch - The New View into Enterprise Productivity and Risk Recorded: Mar 6 2014 57 mins
    Smartwatches, Google Glass and fitness wearables have captured consumer interest imagination the past 12 months. Is the next step adoption into the enterprise?

    While tablets and smartphones kicked off the BYOD revolution, wearable tech will solidify the age of user choice for productivity. Join Fiberlink experts Frank Schloendorn and Jonathan Dale as they debate the pitfalls and perils of these ubiquitous devices as they emerge in networks, systems and the enterprise.

    In this webinar you will get full details on how you can ride the wearables wave into the future and stem the tide of data leaks in your enterprise:

    - Define wearable devices, types, features and their markets
    - Assess risks and define usage parameters to secure corporate data
    - Discuss management options for wearables in MDM
    - Preview the future of wearables in the enterprise
  • Enterprise Mobility Best Practices - 2017 Analysts' Predictions Recorded: Feb 20 2014 47 mins
    We know what year it is, but Fiberlink wants to help you future proof your Enterprise Mobility Management strategy and solutions with guest speaker IDC analyst John Jackson. Mobility is a dynamically evolving design point for enterprise applications of all types. As an IT professional, it can be tough to keep up with the fast pace, new ideas and all those acronyms! MEM, MDM, MAM, BYOD...how does it all fit together and where's it all going?

    Mobile Enterprise Management (MEM) is expected to own $2.1B of the market by 2017.** This isn't hard to believe with more than half of IT Managers reporting that their organizations have implemented an MDM or MAM tool in their mobile strategy. And as the Bring Your Own Device (BYOD) beat goes on, MEM solutions have evolved from device management to incorporate app management, and are now increasingly supporting content management functionality.

    Join John Jackson, IDC analyst,to discuss enterprise mobility:

    - IDC's Third Platform concept and how it changes everything
    - 2-3 -year outlook on EMM
    - Expanding functionality expected from EMM platforms
    - What other IT professionals like you are saying about EMM
    - Essential guidance for IT buyers vetting EMM vendors
  • Part 2: Six Steps to a Solid Mobility Policy in 2014 Recorded: Feb 6 2014 59 mins
    In Part 1, we shared key trends to watch and consider as you build your mobile plan for 2014. In this session, we take a deeper dive to help you develop your company's mobile policy to fully embrace the BYOD trend, enable employees to be productive on any device they choose, and keep corporate data secure.

    Watch Ovum analyst, Richard Absalom, as he outlines Ovum's 6 recommended areas to consider when building a mobility policy:

    - Security: Safeguarding corporate-sensitive data
    - Employee privacy: Defining clear boundaries between monitoring corporate and personal usage
    - Eligibility: Identifying which employees are suitable for your policy
    - Acceptable use and dealing with policy violations: Educating users to comply with policy regulations
    - Technical support: Determining responsibility for dealing with device malfunctions
    - Reimbursement and total cost of ownership: Drawing the line for corporate expenses
  • Must-Watch Trends for Your Enterprise Mobility Plan Recorded: Jan 9 2014 58 mins
    What should you be focusing on as you build your 2014 enterprise mobility plan? Your Enterprise Mobility Management (EMM) strategy must evolve beyond basic Mobile Device Management (MDM) to include all aspects of mobile as a first point of contact between your business and your customers and employees.

    Join Ovum analyst, Richard Absalom, as he highlights EMM trends to watch and consider in 2014 to stay ahead of the mobile consumerization curve such as:

    - Multi-screening: Meeting employee expectations and productivity needs
    - Mobile first: Defining a mobility policy that addresses how employees are already using mobile (hint: it's so much more than email)
    - Mobile apps: Creating easy-to-use modern business apps to mobilize core tasks

    Ovum is the leading independent global IT & Telecoms Research & Analysis firm based in London. Ovum provides strategic advice to telecom operators, IT vendors, service providers and enterprise IT leaders.

    Richard Absalom is an analyst with Ovum's Enterprise Mobility and Productivity practice, particularly focusing on mobile consumerization. His research examines the impact that mobile devices and applications designed for consumers are having on the corporate environment: identifying the challenges and opportunities it creates for both the enterprise and supply-side vendors; defining the vendor competitive landscape; and providing best-practice recommendations for enterprises and vendors alike.
  • Mobilize Your Corporate Content and Intranet Recorded: Dec 12 2013 61 mins
    Email is still the killer app for smartphones and tablets, but it is not enough to unlock the potential of true mobile collaboration. Your colleagues need simple and secure access to business resources that are behind the firewall, such as SharePoint, Windows File Shares, web apps and Intranet sites.

    Watch our webinar to learn how the MaaS360 Mobile Enterprise Gateway makes it easy to collaborate on the go while securing your data with authorization, encryption and containerization policies. See how you can:

    - Enable secure mobile access to corporate data without device VPN
    - Mobilize SharePoint, Windows File Share and all your intranet sites
    - Protect sensitive corporate data with robust security policies and DLP controls
    - Provide mobile access without requiring changes to your network or firewall security configuration
    - Allow users to collaborate at anytime, anywhere, from their personal devices

    Val Hetrick, Director of Customer Success at Fiberlink, demonstrates how MaaS360 can unleash the potential of your enterprise resources safely and securely on mobile devices.
  • Beware BYOD - Avoiding Data Risks and Liability in the Workplace Recorded: Nov 7 2013 58 mins
    Are you hesitant to implement a BYOD program, because you don't want to breach regulations? With regulatory requirements around every corner, implementing a cohesive Bring Your Own Device (BYOD) program can be daunting. The mobile movement is in full swing, and more employees are accessing sensitive work data on their own devices than ever before.

    View this webinar to learn how to build a rock solid BYOD program from legal experts at Morgan Lewis. You'll learn:

    - Legal benefits and risks of BYOD programs
    - BYOD rollout and implementation guidelines
    - How to manage privacy concerns
    - BYOD best practices
    - How MaaS360 can help ensure you're on solid legal ground

    Guest speakers Scott Milner and Jim Walsh, partners at Morgan Lewis, discuss real world scenarios in which BYOD went bad and we'll show you how to avoid them at your organization.
  • Breaking BlackBerry - Surviving the Downward Spiral Recorded: Oct 31 2013 48 mins
    Until now, a BlackBerry phase out was expected to happen organically over time. New realities are now requiring immediate contingency plans to contain BlackBerry and move toward a multi-platform support model for your BYOD and corporate issued devices.

    View this webinar to learn techniques to revise your BYOD program including:

    - How to leverage the work already started on your BYOD deployment
    - How to add structure and process to your program
    - Best practices to migrate successfully off BlackBerry now
    - Blackberry migration use cases with MaaS360
    - And more!

    The good news is that you are likely ahead of the game if you have already started the organic transition to iOS, Android, and Windows devices.

    Clint Adams, Director of Mobile Technology Solutions at Fiberlink, shares his insights and tips to prepare you for a successful migration off of BlackBerry devices.
  • Kindle Fire in the Workplace - New Enterprise Features! Recorded: Oct 10 2013 53 mins
    Kindle Fire is not just for reading your favorite novel anymore!

    Kindle Fire devices, like the new Kindle Fire HD and HDX are making inroads in the workplace with employees accessing email and sensitive data through corporate networks. Including Kindle Fire products in your BYOD program can reap significant productivity benefits for businesses, schools, healthcare and all types of organizations, but security is key.

    View this webinar to learn about:

    - New Kindle Fire devices and Amazon's Fire OS 3.0 "Mojito" and how they advance productivity in the enterprise
    - How schools can deliver powerful educational content on Kindle Fire devices while protecting student privacy
    - How to use MaaS360 to secure Amazon's Fire OS 3.0 "Mojito" for Kindle Fire HD and HDX tablets in BYOD programs

    MaaS360 integration with Kindle Fire provides the controls for IT to confidently embrace Kindle Fire tablets knowing that sensitive data and network access can be secured easily and reliably. Enterprise features available on the Kindle Fire HD and HDX include device encryption, native VPN client, single sign-on, and certificate-based enrollment.

    Kaushik Srinivas, Product Manager at Fiberlink, presents new Kindle Fire product advances and show you how you can quickly and easily incorporate these powerful devices in your BYOD and education programs.
  • iOS 7 Webinar, Part 2 -- A deeper look at security features and policies Recorded: Sep 26 2013 60 mins
    What Will You Learn?

    Apple's iOS 7 is here! Are you taking advantage of all the new enterprise and security features? Don't get left behind!

    In the first webinar, we covered new enterprise features, end-user features, new device controls like touch ID and a quick demo of iOS 7 features in MaaS360.

    This time, we'll take a deep dive so you'll get expert insight into:

    - Managed Open In
    - Per App VPN
    - Enterprise App Configuration
    - And much more!

    Josh Lambert, Product Manager at Fiberlink, will be your tour guide, giving you insights and tips you'll need to get your company ready to take advantage of powerful iOS 7 features.
  • iOS 7 is here! Learn how to take advantage of powerful enterprise features Recorded: Sep 19 2013 60 mins
    Apple's iOS 7 is a reality! With an all-new design and extensive features focused on the needs of the enterprise, iOS 7 brings some excellent reasons to celebrate for IT. Are you ready to take advantage of all iOS 7 has to offer?

    View this webinar to learn how you can leverage iOS 7 and MaaS360 to:

    - Reclaim and reassign app licenses--and other ways to purchase, - distribute, and manage apps
    - Control apps and accounts that can open sensitive documents and attachments
    - Enhance device security with the new Touch ID fingerprint reader
    - Configure and deploy devices at scale
    - Take advantage of enhanced MDM protocol making MaaS360 even more powerful for managing devices
    - And much more!

    Josh Lambert, Product Manager at Fiberlink, will be your tour guide, giving you insights and tips you can use TODAY to get your company ready to take advantage of powerful iOS 7 features.
  • Achieving Multi-Platform Support in the BYOD Era Recorded: Mar 13 2013 57 mins
    You said "BYOD," they heard "come one, come all"

    While Apple and Google battle to become the world's most preferred mobile platform, MS Surface has already made its presence known in BYOD-friendly work environments. Time will tell whether last month's BlackBerry 10 release will be enough to rethrone the former king of the mobile enterprise. No matter who comes out on top, IT must prepare for the whole lot, as Gartner, Inc. predicts 1.2 billion smart devices will be purchased in the year ahead.

    Tell them "pick a device, any device"

    It doesn't take a magician to master mobile device management (MDM). Learn how to accept multiple device types and OS versions into your BYOD family with confidence. View this webinar and you will learn:

    - Pros and cons of adopting specific OS types into your environment
    - How to mitigate the costs of data loss
    - How to leverage MDM for ease, speed and security
  • Total Enterprise Mobility Recorded: Jan 30 2013 48 mins
    In this 30 minute webinar, John Nielsen provides a demo of MaaS360 followed by a questions & answers section. Visualize the ease in which MaaS360 can be used to manage and secure your mobile apps, documents, and devices.

    You will learn how to:
    - Manage security policies for BYOD and corporate devices
    - Distribute and secure mobile applications and documents
    - Separate and protect sensitive corporate data on mobile devices
    - Leverage the cloud for speed, simplicity, and security
  • Managing the Mobile Chaos Recorded: Jan 18 2013 58 mins
    In 2012, IDC research found 68% of smartphones used for global business were owned by employees. This shift in prevalence of employee-owned devices from corporate-issued devices is forcing organizations to consider the ramifications of such ownership on the security of its applications, data and content.

    New Year's Resolution: Safeguard Social, Mobile and Cloud

    Will you be the savvy organization that says "bring it" to bring your own device (BYOD)? Or the one that forgoes the policies and solutions needed to address broader mobile content control? Join Stephen Drake, Program Vice President for Mobility & Telecom research at IDC, for our first live webinar of the year and learn the steps required to successfully manage and secure your business' mobile ecosystem:

    - Key market trends to morph your strategy
    - Policies and solutions to overcome challenges
    - Success attributes to aim for in 2013
  • Android Agony and SAFE Harbors Recorded: Dec 18 2012 58 mins
    It's that time of year again. You'd like to know what devices are on your BYOD-ers' wishlists, but only Kris Kringle can tell. All you can do now is prepare for whatever's coming, whether it be an Android 4.2 Nexus 7 or a Samsung SAFE equipped Galaxy S III. One has its advantages, the other may impact the way you choose to support Android in the future.

    'Tis the season to be wary!

    Join Frank Schloendorn, Director of MDM Security and Quality Assurance at Fiberlink for our final live webinar of the year and learn about new developments in the Android support community that will change the way manage your devices in 2013:

    - Jarring Jelly Bean: Why the 4.2 update is more than just a bug fix
    - Managing Multi-User: Uphold a 1:1 ratio between users and devices
    - SAFE Salvation: How Samsung, Motorola and HTC are making security easier
  • 10 Simple Policies to Protect Mobility Recorded: Dec 6 2012 57 mins
    According to Gartner, the number of smartphones and tablets sold will exceed the billion mark in 2013, a trend which is "changing the way businesses look at their device strategies." The research firm expects 66% of mobile workers to own a smartphone in less than 5 years.

    Don't Tread on BYOD

    Join Val Hetrick, Fiberlink Director of Customer Success, for ten policies that ensure safe and productive use of smartphones and tablets in the enterprise, plus a demo of how to put them into practice using a mobile device management (MDM) solution:

    - Perfecting passcodes based on company needs
    - Lost device triage - Warn, Block, Wipe
    - Feature follies - Does a camera belong in a corporate setting?
    - App management musts to separate personal and corporate data
    - Score a TouchDown with secure, encrypted Android email
  • Squashing the Top 5 Mobile Security Threats Recorded: Nov 27 2012 36 mins
    Enterprise mobility brings productivity great promise, but at what price? Along with bring your own device (BYOD) comes a variety of devices, operating systems, access points and applications that are forcing IT to reexamine the traditional "defense in depth" security model that served them well in the glory days of the PC and laptop.

    In this webinar, Fiberlink and mobile security expert Michael Finneran of dBrn Associates introduce five unique threats and special challenges involved in contemporary mobile security, and why a strategy shift may be in order for your organization. You will learn:
    - Control considerations across iOS, Android, BlackBerry and Windows devices
    - Strategies for securing devices and squashing threats
    - How to hurdle challenges with mobile device management
  • iPhone 5 and iOS 6: Ready for Business Recorded: Nov 6 2012 59 mins
    Josh Lambert, Fiberlink Product Manager demonstrates how your organization can leverage iOS 6 to improve the end-user mobile experience. Discover how mobile device management (MDM) can make it simpler to deploy, secure, and support the iPhone 5 in your workplace.

    Josh explores the newest enhancements to innovations offered by Apple, providing recommendations for enterprise IT looking to achieve a secure and compliant environment with new devices arriving on scene.

    You'll learn about new management controls and much more:
    - Global LTE and how it will improve on-the-go connectivity
    - Maps: bettering life for the mobile worker one turn at a time
    - Guided Access and its uses for new hire training and client interactions
    - FaceTime without WiFi while staying under your data limit
  • Windows 8: The Good, the Bad and the Modern Recorded: Nov 6 2012 46 mins
    On October 26th, the technology community excitedly embraced the next wave of Microsoft operating systems in Windows 8. This time around, the traditionally PC-centric software has come packed with the cross-platform Modern interface in attempt to bridge the smartphone, tablet, PC device operability chasm.

    How will a security conscious, Defender-equipped MS family will adapt to today's cyber-threat cognizant enterprise community? What technology can be used to manage the devices aimed for its doors? In this webinar, Frank Schloendorn, Fiberlink's Mobility MaaSter for Microsoft products uncovers:

    - Software similarities and differences across each device type
    - Pros and cons of upgrading to the latest OS version
    - Ways to uphold network security with new devices arriving on scene
  • Enterprise Mobile App Management Essentials Recorded: Oct 24 2012 55 mins
    Why so Apprehensive?

    There are over 1 million mobile applications available for smartphone and tablet users. These aren't just diversionary time-wasters either; industries from medicine to manufacturing are finding countless efficiency from an app-enabled workforce. As productivity moves from mouse clicks to finger swipes, IT must lead the charge on how apps are developed, deployed, managed, secured, and even decommissioned in the mobile enterprise.

    Managing millions made easy

    Join John Nielsen and Ryan Hope of Fiberlink for a complete walkthrough of enterprise mobile application management (MAM). You'll learn the best practices across the entire mobile app management lifecycle:

    - Techniques to build more innovative and useful apps
    - Distributing apps to specific groups through enterprise app catalogs
    - Publishing app updates to your entire mobile workforce
    - Enforcing app security based on compliance rules
    - Researching and recommending apps to users
    - Selectively removing corporate apps from devices
  • Best Practices for Securing Data on Mobile Devices Recorded: Sep 26 2012 42 mins
    How do you contain corporate data on personal devices?

    As the BYOD trend gains momentum, not all employees are comfortable having their personal phones locked down and controlled as tightly as a corporate-issued device. To get around this issue some organizations are turning to separation techniques to securely manage corporate email, apps, and docs on employee devices while keeping personal data out of sight and out of mind.

    Forgoing some visibility into personal information should not compromise security or the user experience. Join the Mobile MaaSters from Fiberlink in this upcoming webinar to discover ways to manage iPhones, iPads, and Androids without sacrificing the collective expectations of BYODers.

    During this session you will learn:
    - How to configure personal devices and enforce granular level policies
    - Methods to distribute and control corporate data on personal devices
    - When to opt for a full device wipe versus a selective wipe
    - What BYOD Privacy Settings can do to keep personal data personal
Learn how to manage iPhones, iPads, and Androids in the enterprise.
This channel features recordings from Fiberlink’s educational webinar program featured on its MaaSters Center online community, providing insight, best practices and expertise on enterprise mobility management.

Subscribe for expert opinions from mobility experts and industry analysts who will help you develop an effective mobile device management (MDM) strategy to serve the needs of your organization.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Comparing Apples and Androids: The Enterprise Security Showdown
  • Live at: Aug 27 2012 7:30 pm
  • Presented by: Lisa Phifer, President, Core Competence, Inc.
  • From:
Your email has been sent.
or close
You must be logged in to email this