How to prepare for BYOD (Bring Your Own Device)
- LANGUAGE: English DATE: Thursday, June 30, 2011 TIME: 18:00 CEST, 09:00 US/Pacific
In a recent blog entry, KuppingerCole´s principal analyst Martin Kuppinger wrote, that the acronym BYOD stands for IT departments accepting that they’ve lost against their users. Now we have to see, how we can make the best out of it and minimize the risks involved with private mobile devices logging into corporate networks. In this webinar, Tim Cole will moderate a discussion between Craig Burton and Martin Kuppinger on how to prepare your enterprise for BYOD by providing a risk-based selection of secure paths to access corporate information and to protect that information.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.