Preparing your Enterprise for the Generation Y: BYOD & Mobile Device Management
- LANGUAGE: English DATE: Tuesday, August 07, 2012 TIME: 17:00 CEST, 11:00 EDT, 15:00 GMT
A phletora of mobile devices are invading the enterprise at incredible speed, raising issues in areas like access control, policy enforcement, security of confidential data on users’ devices, and many others. Practices of “bring your own device,” (BYOD) and “company owned, personally enabled,” (COPE) are trying to describe methods of mitigating the risks involved. In this training, KuppingerCole Principal Analyst Martin Kuppinger will help IT professionals to find their best way through the myriad of recommendations and solutions related to this issue, and implement the right corporate policies and security tactics.
BYOD is one of the hot topics for any IT organization today. It is not a trend, it is a fundamental shift. And it is not only about smartphones and tablets, but also about other types of devices from traditional PCs in the home office to notebooks business partners want to use within your network. There are no signs that IT ever will be able to change that shift. Thus it is about focusing on how to stay in control. And it’s about staying in control of the corporate information, not in control of the devices. The simple facts that there are too many different devices with too many different operating systems and too much change on one hand and that these devices aren’t always owned by the organization, thus limiting control from the legal perspective, requires another paradigm shift: The shift from device-centric security to information-centric security and, to some degree, network-centric security in the sense of “securing the pipes”. However, the latter is more complex than it sounds in a world where we are facing much more different types of connections and many things remain in the Cloud, not even touching the corporate IT environment.
This webinar will provide you with information on how to really stay in control. It looks at different technical approaches from MDM (Mobile Device Management) to Desktop Virtualization and Information Rights Management. It analyzes whether, when, and how these technologies might help you in securing the corporate information in a BYOD environment. It provides insight in how to deal with that shift – effective and efficient.
Continuing Education Credits
After attending this webinar you will be able to:
- Implement the most important corporate policies and security tactics to mitigate risks relate to the empowerment of mobile worksforces.
- Understand the strengths and weaknesses of device-centric, network-centric, and information-centric security concepts.
- Evaluate mobile device management (MDM) solutions and find the ones suiting your needs.
This event qualifies for 1 Group Internet Based CPE
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: email@example.com
Häufig beginnt die Suche nach einer Identity-Lösung mit einem ganz konkreten Schmerzpunkt im Unternehmen. Ein nicht bestandener Compliance-Audit wegen überhöhter Zugriffsberechtigungen, technische Probleme, wegen komplexer Systeme frustrierte User und eine Überforderung des Helpdesk mit Berechtigungsanforderungen und Passwort-Resets sind nur einige der vielen möglichen Ursachen. Selbst nach einer erteilten Budgetfreigabe für die Anpassung der IAM-Landschaft sind die Hürden vielfältig.