Think shoulder pads and referees. Your players know how the game works but need a way to play it safe and in accordance with the rules. Are you doing your part to uphold a safety net for your mobile devices and their users? Use this forum to ask questions and discuss your end-user security & compliance strategy.
Currently, there are:
2560 Views | 0 Replies
Share your thoughts with us,
and get involved!
Enterprise mobility brings productivity great promise, but at what price? Along with bring your own device (BYOD) comes a variety of devices, operating systems, access points and applications that are forcing IT to reexamine the traditional "defense in depth" security model that served them well in the glory days of the PC and laptop.
In this webinar, Fiberlink and mobile security expert Michael Finneran of dBrn Associates introduce five unique threats and special challenges involved in contemporary mobile security, and why a strategy shift may be in order for your organization. You will learn:
android android passcode pattern face unlock bring your own device byod cio cloud domain-password-expiration encryption enterprise mobility iaas ios ios-prompt-for-new-password jelly bean legal mdm mobile device management ndes out of compliance password-prompt password change multiple prompt ipad privacy saas secure browser security webinar