Think shoulder pads and referees. Your players know how the game works but need a way to play it safe and in accordance with the rules. Are you doing your part to uphold a safety net for your mobile devices and their users? Use this forum to ask questions and discuss your end-user security & compliance strategy.
Currently, there are:
4378 Views | 0 Replies
Share your thoughts with us,
and get involved!
Enterprise mobility brings productivity great promise, but at what price? Along with bring your own device (BYOD) comes a variety of devices, operating systems, access points and applications that are forcing IT to reexamine the traditional "defense in depth" security model that served them well in the glory days of the PC and laptop.
In this webinar, Fiberlink and mobile security expert Michael Finneran of dBrn Associates introduce five unique threats and special challenges involved in contemporary mobile security, and why a strategy shift may be in order for your organization. You will learn:
api bring your own device byod certificates device security emm enterprise mobility management identity certs maas360 ios app disable pin maas360 secure broswer mdm mobile device management mobile security network security passcode ports firewall dmz perimeter reports secure browser secure mail address lookup sim change notification cellular data udid vpn web services windows phone windows phone 7.5