BYOD: Challenges and Opportunities with a Distributed Salesforce

Darren Platt, Symplified CTO and co-author of SAML and Lincoln Cannon, Director, Sales and Marketing Technology for Merit Med
With employees working in the cloud and bringing their own devices, IT is faced with the challenge of balancing user access controls and user experience. In 45 minutes, learn how an identity-based security model for mobile users can protect cloud apps and data, provide universal coverage for all mobile platforms, and enable single sign-on from any mobile device to all the information resources business users need.

Join Darren Platt, Symplified CTO and co-author of SAML and Lincoln Cannon, Director, Sales and Marketing Technology for Merit Medical, as we discuss the crucial role a centralized identity service plays to ensure both end-user productivity and IT efficiency.
Apr 25 2013
56 mins
BYOD: Challenges and Opportunities with a Distributed Salesforce
More from this community:

Cloud Computing

  • Live and recorded (4192)
  • Upcoming (131)
  • Date
  • Rating
  • Views
  • A lot has changed in the way we communicate for business. A decade ago, most organizations had employees who came to the office every day, used desktop computers and desk phones, and stopped communicating for work when they went home.

    Today, people communicate for work anywhere, anytime, and on any device. Per Forrester, sixty-six percent of employees use two or more mobile devices for work. And according to Frost & Sullivan, nearly 25 percent of employees work from home or the road. What’s more, the desk phone is not the only business device. Based on a RingCentral survey, 35 percent of employees are using their mobile phones for work even when they are in the office. And nearly 80 percent of employees text for business, with 32 percent reporting that they’ve even closed a business deal via text.

    Even with these undeniable business behavior changes, the vast majority of companies haven’t optimized their communications infrastructure for mobile workforces or BYOD.

    Join this webinar to get ahead of the pack and learn the benefits of a cloud communications solution that supports the new world of work.

    •Understand the trends driving mobility and behavior changes in the work place, with Melanie Turek, VP of Research for Enterprise Communication & Collaboration, Frost & Sullivan.
    •Get the real story from a business that has addressed their mobility needs first hand from Adam Fishman, director of growth and operations for Lyft, a community ride-sharing service.
    •Hear how a cloud communications solution is addressing several challenges businesses face in the new work world from Nisha Ahluwalia, VP of product marketing at RingCentral.
  • We all want our families and homes to be safe with the convenience of remote monitoring, but do these smart home security devices really make our families safer or put them at more risk by inviting easier access to our homes electronically via insecure Internet of Things? In a follow-up to HP’s 2014 report on the Internet of (Insecure) Things we explore the security of popular off-the-shelf connected Home Security Systems and discuss various testing techniques we used in our study along with recommendations for manufacturers, developers and consumers.
  • Mobile is changing the way we work in the enterprise. Today’s workforce is demanding the ability to access and share business files from any device. In this webinar learn why Fortune 5000 companies select Syncplicity to achieve the promise of mobile productivity and solve the “Dropbox” problem.
  • From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
  • Looking for a simple way to achieve cost-effective z Systems for storage? Join CA Technologies and Microsoft for an interactive discussion, moderated by Joe Clabby, President, Clabby Analytics, on the evolving role of cloud innovation and z Systems in today’s new application economy to help IT derive real business value through operational and cost efficiencies.

    Your tape and disk systems are like trusty friends – and you have relied on these dependable storage media to backup, restore, archive and recover z Systems data. And with your organizations’ digital information growing from gigabytes to petabytes seemingly overnight, what options are available to datacenters when technology leapfrogs in a seemingly regular cadence? Buy more hardware?

    Don’t be forever caught in “catch up” mode when it comes to your storage infrastructure. Attend this webcast and discover how CA Cloud Storage for System z, featuring Microsoft Azure, simplifies the process of storing mainframe data in the cloud and help lower data center storage costs to pennies per GB. Hear compelling ROI cases how re-envisioning your existing storage methodologies can help you store more and spend less – yes, it’s possible!
  • The game has changed. Due to cost savings, and the privacy and mobility needs of employees, in just a few short years companies have loosened the mobile device leash. Enterprises are now shifting from traditional “company owned” devices, to allowing “Bring Your Own Device” in the workplace. According to Gartner, by 2017 fifty percent of companies will actually force employee to bring their own device to work.

    But if you’re tasked with securing devices, how do you accommodate BYOD? Where do you start and what kinds of security solutions should you be looking for?

    In this webinar, Chris Hines, Product Manager at Bitglass will teach you how to balance the needs of IT admins and employees when it comes to securing your mobile world.
  • Looking for a simple way to achieve cost-effective z Systems for storage? Join CA Technologies and Microsoft for an interactive discussion, moderated by Joe Clabby, President, Clabby Analytics, on the evolving role of cloud innovation and z Systems in today’s new application economy to help IT derive real business value through operational and cost efficiencies.

    Your tape and disk systems are like trusty friends – and you have relied on these dependable storage media to backup, restore, archive and recover z Systems data. And with your organizations’ digital information growing from gigabytes to petabytes seemingly overnight, what options are available to datacenters when technology leapfrogs in a seemingly regular cadence? Buy more hardware?

    Don’t be forever caught in “catch up” mode when it comes to your storage infrastructure. Attend this webcast and discover how CA Cloud Storage for System z, featuring Microsoft Azure, simplifies the process of storing mainframe data in the cloud and help lower data center storage costs to pennies per GB. Hear compelling ROI cases how re-envisioning your existing storage methodologies can help you store more and spend less – yes, it’s possible!
  • Lee Smith (Dee Smith & Associates) and David Cuthbertson (SMS) will cover their approach and methods of assessing existing data centre facilities and management processes. Rapid changes in both IT and data centre technologies often mean that facilities and management techniques fail to evolve fast enough, with the data centre potentially being the weak link in the delivery chain of all IT services. Achieving a baseline through an assessment is critical for any improvement or transformation activity - but is not so easy to do in practice.
  • Many companies struggle with how to sell effectively with different brands, platforms, and divisions. One company, Cenveo, has tackled this challenge head-on with Sales Cloud and Data.com, working through culturally diverse business units, data silos owned by territorial sales reps, and challenges cross selling.

    There are many approaches to achieve more effective selling which we will explore with Jason Jordan of Vantage Point Performance, author of the best-selling book, Cracking the Sales Management Code.

    Jason will share best practices that drive business results and Kathy Coates, VP of Platform Sales Technology at Cenveo, will share how Cenveo:

    -Saw immediate results from bringing together sales for 3 separate brands
    -Reinvented how they sell--and changed their company culture
    -Achieved more visibility into their entire pipeline than ever before
    -Discovered new opportunities through account hierarchies
    -Gained "eye-opening" insights on their customers
  • Most IT providers have offers related to big data, cloud, mobility and security, and companies are looking at IT as the way to reduce costs and be competitive during an economic crisis. Investments in IT trends such as cloud computing and big data will rise thanks to a new player in the game: the business departments. This analyst briefing will show why companies are investing in IT, and what will change in 2015.

    Why you should attend:

    - Discover how many companies will adopt big data, cloud, mobility and security in 2015
    - Understand the current scenario of these trends in Latin America
    - Learn what will be different in 2015 regarding each trend
  • Channel
  • Channel profile
  • Understanding IAM Part 1 Recorded: Sep 24 2013 59 mins
    Part 1 of a three-part learning series: Understanding and Selecting IAM for Cloud Services.

    Get conceptual awareness of IAM terms and concepts, bring them into sharp focus. This segment will enable you to:

    -Itemize features and benefits common to most cloud identity and access management systems
    -Be aware of key cloud identity services issues
    -Disentangle design from implementation standards by learning IAM design patterns to describe the architecture
  • Introducing Symplified, Single Sign-On for Education... Making BYOD Easy Recorded: Aug 15 2013 31 mins
    If your organization has any interest in increased productivity, enhanced security, or reduction of support costs, a serious evaluation of Single Sign-On solutions is absolutely essential. Learn how you can tackle the complexity of user access to cloud, web and internal applications and manage single sign-on, access control, account provisioning, and audit reporting under one roof.
  • Bridging the Identity Gap - 6 Identity-as-a-Service Best Practices for Education Recorded: May 28 2013 49 mins
    IT departments at schools across the country are challenged with on boarding thousands of new students and faculty users to internal and cloud applications each year. Furthermore, they are faced with a number of government compliance regulations, user privacy concerns and tasked with providing the most seamless learning experience possible. Add to this the expectation of application access from any mobile device and it becomes even more difficult to control which users have access to what applications and resources. That’s where Identity as a Service (IDaaS) comes into play.

    During this webcast, learn how you can:
    ➢Integrate disparate user types, applications, and mobile devices
    ➢Maintain visibility into user behaviors and app usage
    ➢Simplify access to applications such as Blackboard, ePals Google Apps, and Office365 as well as internal proprietary resources
    ➢Reduce help desk burden through self-service password reset functions
    ➢Increase security, meet regulatory requirements and centralize policy enforcement
  • How To Manage Identities - Symplified Recorded: May 6 2013 2 mins
    Watch this video from Symplified on how to seamlessly connect users and applications located on-premises or in the cloud, with a single sign-on.
  • BYOD: Challenges and Opportunities with a Distributed Salesforce Recorded: Apr 25 2013 56 mins
    With employees working in the cloud and bringing their own devices, IT is faced with the challenge of balancing user access controls and user experience. In 45 minutes, learn how an identity-based security model for mobile users can protect cloud apps and data, provide universal coverage for all mobile platforms, and enable single sign-on from any mobile device to all the information resources business users need.

    Join Darren Platt, Symplified CTO and co-author of SAML and Lincoln Cannon, Director, Sales and Marketing Technology for Merit Medical, as we discuss the crucial role a centralized identity service plays to ensure both end-user productivity and IT efficiency.
  • Symplified Management Console Recorded: Mar 21 2013 39 mins
    Symplified's Management Console is a highly secure, highly monitored service enabling administrators to manage authentication, authorization, application integration and access management, among others. This webcast will specifically cover:-

    Authentication Configuration
    Defining Access Policies
    Application Integration
    Portal configuration
  • Symplified Solutions Overview Recorded: Feb 21 2013 44 mins
    Symplified provides a comprehensive cloud identity solution that helps service-oriented IT organizations simplify user access, regain visibility and control over application usage and meet security and compliance requirements. This webcast will provide a comprehensive overview of the Symplified solution, and cover key topics including: -

    · Secure single sign-on (SSO)
    · Identity & Access Management (IAM)
    · Secure Application Integration
    · Audit & Compliance
    · Directory Integration
    · Strong Authentication
    · Flexible Deployment Options
  • Making Identities Work Securely in the Cloud: Best Practices Recorded: Jan 31 2013 48 mins
    Identity Management is the great IT challenge of the SaaS computing era. Providing authentication and authorization in a way that's convenient, efficient while safe and secure from outsiders is the key. Done well, you can make IT a valuable asset in the deployment of cloud apps. This webcast will outline 7 key best practices which can
    help any IT department harness the complexity of the cloud and put it to work for the organization.
  • Preventing Side Door Access: Ensuring Compliance and Data Security Recorded: Jan 10 2013 32 mins
    When users bypass an organization’s single sign-on solution it can create numerous compliance challenges for IT. This webcast will examine the impact of side door access on the ability of an organization to:

    •Accurately report on application usage
    •Successfully meet audit and compliance requirements
    •Eliminate data loss from security breaches resulting from directly
    accessed applications

    This webcast will examine how Symplified’s solution prevents side door access, and is based on a White Paper which will be distributed to all attendees.
  • Securing and Monitoring Cloud Applications Recorded: Dec 13 2012 33 mins
    The adoption of cloud-based infrastructure introduces concerns around security and compliance. This webcast will look at controlling a decentralized environment and security, specifically:
    Activity monitoring & Governance
    Access Control
    Unified SSO
    Deployment
    All webcast attendees will receive a copy of Symplified's white paper, Securing & Monitoring Cloud Applications: Principles of Cloud Service Governance
  • Single Sign-On to Go! How IAM Can Support BYOD Recorded: Sep 6 2012 44 mins
    In addition to managing cloud-apps and user accounts scattered across a network, IT staff must implement a solution to manage personal mobile devices. It needs to be flexible enough to include new devices that want to join the network yet capable of securing any mobile platform and operating system. IT must strike a balance between the need to access the corporate network and the need to protect and manage access to valuable intellectual property. This webcast will explore Identity Management and how it supports mobile devices in an increasingly BYOD world.
  • Cloud Identity: Past, Present, Future Recorded: May 6 2010 55 mins
    Panelists:
    Darren Platt, CTO, Symplified
    Russell Dietz, CTO, SafeNet
    Ravi Srinivasan, Program Director, IAM, IBM
    Anil Saldhana, Red Hat/OASIS IDtrust
  • Technology Dig: Breaking Down the Complexity of Cloud Security Recorded: Nov 12 2009 63 mins
    Understand the new challenges for identity and access management that address cloud security.

    Join this webcast and learn how to:

    * Extend your enterprise to the cloud while maintaining enterprise class security

    * Complete identity access management projects in days, not months, to quickly realize the value of cloud security

    * Eliminate custom coding using a configuration, no coding approach that does not require expert resources

    * Strengthen security and compliance for your internal and external applications

    * Increase user adoption by expanding the value and accessibility of your network

    * Quickly integrate SaaS and enterprise applications
Single Sign-On Best Practices From The IAM Experts
This channel is designed for anyone who is responsible for considering, deploying or managing single sign to cloud or SaaS apps, or identity & access management solutions, whether that solution faces internally for employees or externally for customers and partners; it is also relevant for anyone who is concerned with cloud security, audit, compliance and DLP

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: BYOD: Challenges and Opportunities with a Distributed Salesforce
  • Live at: Apr 25 2013 5:00 pm
  • Presented by: Darren Platt, Symplified CTO and co-author of SAML and Lincoln Cannon, Director, Sales and Marketing Technology for Merit Med
  • From:
Your email has been sent.
or close
You must be logged in to email this