Think shoulder pads and referees. Your players know how the game works but need a way to play it safe and in accordance with the rules. Are you doing your part to uphold a safety net for your mobile devices and their users? Use this forum to ask questions and discuss your end-user security & compliance strategy.
Currently, there are:
4758 Views | 0 Replies
Share your thoughts with us,
and get involved!
Enterprise mobility brings productivity great promise, but at what price? Along with bring your own device (BYOD) comes a variety of devices, operating systems, access points and applications that are forcing IT to reexamine the traditional "defense in depth" security model that served them well in the glory days of the PC and laptop.
In this webinar, Fiberlink and mobile security expert Michael Finneran of dBrn Associates introduce five unique threats and special challenges involved in contemporary mobile security, and why a strategy shift may be in order for your organization. You will learn:
android api app security byod certificates doc security email security emm identity certs maas360 ios app disable pin mdm mobile security network security passcode ports firewall dmz perimeter reports scep secure mail address lookup sim change notification cellular data syslog udid web services wifi windows phone windows phone 7.5