Think shoulder pads and referees. Your players know how the game works but need a way to play it safe and in accordance with the rules. Are you doing your part to uphold a safety net for your mobile devices and their users? Use this forum to ask questions and discuss your end-user security & compliance strategy.
Currently, there are:
5411 Views | 0 Replies
Share your thoughts with us,
and get involved!
Enterprise mobility brings productivity great promise, but at what price? Along with bring your own device (BYOD) comes a variety of devices, operating systems, access points and applications that are forcing IT to reexamine the traditional "defense in depth" security model that served them well in the glory days of the PC and laptop.
In this webinar, Fiberlink and mobile security expert Michael Finneran of dBrn Associates introduce five unique threats and special challenges involved in contemporary mobile security, and why a strategy shift may be in order for your organization. You will learn:
antivirus application security app security bring your own device byod certificates device security doc security document security email security enterprise mobility management identity certs malware mdm mobile security network security passcode ports firewall dmz perimeter reports sim change notification cellular data webcast webinar web services windows phone windows phone 7.5