Hi [[ session.user.profile.firstName ]]

Windows 10 and EMM Changes the Future of PC Security and Management

Enterprise IT is facing an ever-increasing level of management complexity. From legacy PC clients to mobile devices running multiple operating systems, admins must juggle more security and management tasks than ever before. Until now, PC management has involved a variety of tools to try to meet all of these requirements. But now, Windows 10, combined with EMM, offers a more unified approach to managing PCs and mobile devices.

Watch this webinar to learn how Windows 10 and EMM is changing the game for PC security and management going forward.
Recorded Jun 22 2016 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Abby Guha, Director of Product Marketing
Presentation preview: Windows 10 and EMM Changes the Future of PC Security and Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Killing Passwords using Zero Sign-On Recorded: Sep 23 2020 41 mins
    Rima Pawar, Head of Identity Products, MobileIron
    As work environments transform to adapt to the pandemic era, organizations need to make sure that changes to their infrastructure do not cause security holes and deficiencies that malicious actors can exploit. The key to success will hinge on providing secure, reliable and seamless authentication to employees. Join us as we discuss why you should consider passwordless MFA and how to go about choosing the right one for your organization.
  • Effective Anti-Phishing Requires 100% User Adoption. Here's How to Do It. Recorded: Aug 17 2020 37 mins
    Matthew Law, Senior Lead Product Marketing Manager, Mirko Bülles, Senior Lead Technical Marketing Engineer, at MobileIron
    Investing in an anti-phishing solution for mobile devices is one thing. However, driving widespread deployment for this added layer of protection is another. Why? Because in most cases, admins are forced to rely on some level of user interaction to activate anti-phishing on their devices. What does this mean for your organization? Cracks your mobile security armor. And what does this mean to hackers? Time to phish!

    Don’t gamble with your organization’s data. MobileIron Threat Defense (MTD) now includes powerful, multi-vector anti-phishing to protect your users from today’s increasingly complex and stealthy phishing attacks. Join our webinar to learn how you can:

    - Leverage seamless, admin-driven activation to achieve 100% user adoption for multi-vector anti-phishing.
    - Provide protection for all internet-based traffic: corporate email, apps, in-app browsers, text/SMS, messenger apps, social and future modes of communication.
    - Maintain full control of the balance between security and user privacy.

    Matthew Law, Senior Lead Product Marketing Manager, MobileIron

    Matt Law has more than 20 years of combined experience in tech product management, product marketing and sales. Prior to joining MobileIron as a product marketing manager for mobile security, he served in similar roles in the areas of high-performance computing (HPC), backup and recovery (BAR), continuous data protection (CDP) and desktop virtualization

    Mirko Bülles, Senior Lead Technical Marketing Engineer, MobileIron

    Starting his MobileIron career as an early customer in 2011, Mirko is now part of the Technical Marketing organization assisting European MobileIron customers, prospects and partners to enable MI products and solutions throughout their organization. Mirko is also a certified ethical hacker and contributes to the development of MobileIron Threat Defense product.
  • How to onboard remote workers over-the-air for both corporate-owned and BYOD Recorded: Apr 2 2020 31 mins
    James Saturnio, Senior Solutions Architect MobileIron
    Device on-boarding, enrollment, and configuration is oftentimes the most complex part of rolling out a BYOD program. This is also the case for corporate-owned laptops which often have to be re-imaged requiring employees to ship their devices back to IT offices impacting both employee and IT productivity.

    Tune-in to this webinar to learn how UEM platforms and modern device management techniques enable you to:

    • Onboard smartphone, PCs, and laptops over-the-air, without requiring physical access
    • Configure specific policies and controls based on device ownership
    • Provide users with an intuitive on-boarding experience that does not require them to read a 10 page guide to device enrollment
  • Rapidly Securing Your Remote Workforce in Times of Pandemics Such As COVID-19 Recorded: Mar 30 2020 45 mins
    Mirko Bulles, Senior Lead Technical Marketing Engineer MobileIron
    As COVID-19 continues to spread around the world, many organizations are prioritizing the health of their workforce and recommending that employees work from home. While enabling remote work is essential to business continuity at this time, organizations cannot lose sight of their information security needs.

    Join us on this webinar to learn how the MobileIron UEM platform can help:

    • Provide easy and secure access to employees working remotely
    • A secure workspace on any device to minimize impact to productivity
    • Seamless device lifecycle management with over-the-air provisioning
    • Comprehensive visibility and policy enforcement to prevent data loss and maintain user privacy
  • New Legal Requirements for Mobile Security – EMM is not Optional Recorded: Aug 23 2016 36 mins
    Ojas Rege, MobileIron VP Strategy, and Carl Spataro, MobileIron Chief Privacy Officer
    As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.

    This webcast is for Mobile IT and information security professionals and their legal and compliance teams. This webcast will cover:

    The foundational security controls now required by law
    How these controls are applied to mobile
    Best practices to achieve compliance
    The central role of Enterprise Mobility Management (EMM)
  • Secure Enterprise Cloud Apps on Mobile Devices with MobileIron Access Recorded: Aug 5 2016 2 mins
    MobileIron Animated Video
    MobileIron Access secures enterprise cloud apps on mobile devices. Reduce information security risks by allowing only trusted users, on trusted devices, using trusted apps to access business data. By establishing a data boundary for mobile cloud apps, IT can prevent users from accessing enterprise cloud services on unsecured devices or through unauthorized apps or browsers. Watch this overview to learn more.
  • Mobile IT: Securing Android for Work Enterprise and Personal Workspaces Recorded: Jul 28 2016 47 mins
    Adrian Kok, Director of Product Management
    For many mobile IT admins, Android has been a challenge from a management perspective due to the nature of its fragmentation, open-source capabilities, and broad range of devices. Google’s Android for Work promises to simplify the experience for both users and administrators for various common deployment scenarios.

    Join us in this session as we will cover the following:

    - Overview of various deployment options such as Device Owner and Profile Owner deployments
    - How enterprises can deploy, manage and secure corporate apps and data on Android devices
    - How to protect Android devices using Android for Work
  • Windows 10 and EMM Changes the Future of PC Security and Management Recorded: Jun 22 2016 38 mins
    Abby Guha, Director of Product Marketing
    Enterprise IT is facing an ever-increasing level of management complexity. From legacy PC clients to mobile devices running multiple operating systems, admins must juggle more security and management tasks than ever before. Until now, PC management has involved a variety of tools to try to meet all of these requirements. But now, Windows 10, combined with EMM, offers a more unified approach to managing PCs and mobile devices.

    Watch this webinar to learn how Windows 10 and EMM is changing the game for PC security and management going forward.
  • Introducing MobileIron Access: The Solution to Cloud-Mobile Data Security Recorded: May 31 2016 46 mins
    Vijay Pawar, MobileIron Director of Product Management
    With MobileIron Access, organizations can now secure cloud services, such as Box and Salesforce, on mobile devices. Organizations can now be assured that users only connect to enterprise cloud services via trusted apps on managed devices.

    MobileIron Access addresses a key security gap - employees accessing enterprise cloud services on unmanaged devices, via unmanaged apps and storing corporate data outside of IT control.

    View this webinar to learn how MobileIron Access:

    - Can enable access control to enterprise cloud services such as Box, Google Apps for Work, Office 365 and Salesforce

    - Prevent access to cloud services from apps and devices not authorized by IT

    - Establish a data boundary for mobile-cloud apps to keep business data within IT control at all times
  • Legal and Practical Implications of Today’s Mobile Workplace Privacy Debate Recorded: Mar 7 2016 38 mins
    Carl Spataro, Chief Privacy Officer; Boris Segalis, Partner Norton Rose Fulbright; Michael Raggo, Director, Security Research
    Recent legal debates about the encryption of mobile devices have elevated the topic of enterprise security and its implications on end-user privacy. For example, in the aftermath of the San Bernardino tragedy, we learned that enterprise-managed mobile devices can be remotely unlocked by the IT administrator.

    To provide more insight on this complex topic, MobileIron is hosting a panel discussion with mobile security and privacy experts to share what CIOs need to know about mobile security and end-user privacy. Panelists will discuss the implications of the San Bernardino case and how this case helps illustrate best practices for balancing the need for enterprise security with respect for employee privacy.
  • Mobile CIO - Prepping Your 2016 Mobile Security Playbook Recorded: Dec 10 2015 47 mins
    Ojas Rege, Vice President, Strategy, MobileIron
    Mobility is a catalyst for disruption in the architecture, operations, and governance of today’s enterprise IT. 2015 gave us a major evolution in operating system architecture (Android for Work, Windows 10), the emergence of wearables (Apple Watch), and an expanded threat landscape (StageFright, XcodeGhost, YiSpecter).

    This coming year will require a rethink of traditional security approaches as mobile and desktop merge and application modernization becomes a priority. This session provides a practical walk-through of the issues and potential initiatives CIOs must address as they plan for 2016.
  • MobileIron EMM Platform Fall Release: New Capabilities to Drive Mobile Security Recorded: Nov 17 2015 40 mins
    Muthu Somasundaram, Director of Solutions Marketing; Jay Bhansali, Sr. Technical Marketing Engineer
    Learn about MobileIron’s latest product features introduced in the fall 2015 timeframe that help IT professionals enable mobile devices initiatives in their organizations, including giving employees secure access to their corporate productivity suite, content and web applications. The MobileIron mobile security platform also allows organizations to implement a secure framework to deliver applications that can transform their business workflows.

    In this webinar, you will learn about:

    - Key features that were released in the fall timeframe
    - MobileIron solutions for key business issues
    - MobileIron ecosystem partner integrations
  • Windows 10 - A Unified Platform for the Modern Mobile Enterprise Recorded: Oct 2 2015 3 mins
    Alexander Romero, Senior Director, Product Marketing
    Watch this short webinar to get an overview of Windows 10, which converges traditional Windows operating systems to allow for security and management through a single, unified platform across mobile, desktop, and embedded products. This unified platform also allows programmers to develop and manage universal apps that can be written once and run on any form factor and screen size. As a result, the application experience will now be the same on a Windows PC, phone, or tablet, which is a huge evolutionary step for Windows in the enterprise.
  • Securing Office 365 with MobileIron Recorded: Oct 1 2015 58 mins
    Ojas Rege, MobileIron Vice President, Strategy
    Office 365 is Microsoft’s cloud-based productivity suite. Office 365 is central to Microsoft’s strategy as the company evolves into a mobile-first, cloud-first software and solutions provider. Office 365 is also central to the productivity strategy of many MobileIron customers since their employees will increasingly use Office on mobile devices instead of traditional PCs. Therefore the ability to secure and deploy Office 365 on mobile devices using MobileIron is a common requirement. This webinar will outline the MobileIron security framework for mobile apps and how it can be used to secure and deploy Office 365 on mobile devices.
  • Mobile Security Update: What iOS 9 Means for the Enterprise Recorded: Sep 22 2015 3 mins
    Alexander Romero, Sr. Director of Product Marketing
    The release of iOS 9 offers much more than just new features for consumers and enterprise users. It greatly simplifies the complex challenges that IT organizations face when securely deploying iOS mobile devices and apps across the enterprise.
  • The Mobile First Enterprise Recorded: Sep 1 2015 4 mins
    Ojas Rege, VP Strategy
    MobileIron's mission is to enable companies of all sizes to become Mobile First organizations, embracing mobility as their primary IT platform to transform their businesses and increase their competitiveness.
Secure Enterprise Information as it Moves to Mobile and the Cloud.
Enterprise information is everywhere: in the datacenter, in the cloud, in mobile apps, and on mobile devices. MobileIron secures enterprise information wherever it lives.

The MobileIron enterprise mobility management (EMM) platform was built to secure and manage apps and content across modern operating systems at enterprise scale. It incorporates identity, context, and privacy enforcement to set the appropriate level of access to enterprise data and services.

Apply consistent security policy and configuration across your organization from a single integrated platform.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Windows 10 and EMM Changes the Future of PC Security and Management
  • Live at: Jun 22 2016 8:05 pm
  • Presented by: Abby Guha, Director of Product Marketing
  • From:
Your email has been sent.
or close