Securing the communication of Mobile Devices
Facebook Twitter LinkedIn

Securing the communication of Mobile Devices

Workshop
Friday, April 20, 2012 13:30—15:00
Location: Alpsee

With the rising amount of Mobile Devices and Apps, a new challenge drives the integration and security teams in companies. Harmless and business critical applications run on the same device of managers and workers. The well established software deployment policies do not work well in this dynamic environment. Clearly identifying the privileged user and securing the content of his communication is a real challenge.

The second part of the talk will highlight the recommended principles and implementation parts of a secure, manageable and payable architecture for providing valued mobile apps to the different users and devices in your company.

Securing the communication of Mobile Devices
Presentation deck
Securing the communication of Mobile Devices
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Alexei Balaganski
Alexei Balaganski
KuppingerCole
Alexei is an analyst with specific focus on cybersecurity and Artificial Intelligence. At KuppingerCole, he covers a broad range of security-related topics: from database, application and API...
Eric Fulton
Eric Fulton
Lake Missoula Group
Eric Fulton is a specialist in network penetration testing and web application assessments. His clients have included Fortune 500 companies, international financial institutions, global insurance...
Axel Grosse
Axel Grosse
Vordel
Subscribe for updates
Please provide your email address