
Each BYOD implementation is unique, and there is no one right solution. BYOD requires a unique blend of policy management, security technology, and outreach and education, and there are several paths to the same goal.
In this Webinar, the panelists will explore the challenges exposed by BYOD and help sculpt a framework for evaluating the authentication and management tools available to secure employee-owned devices. They will also discuss how to tailor a BYOD strategy that works for your industry and corporate culture.
Join GigaOM Research and our sponsor Centrify for “Security in the Age of BYOD: How Enterprises Can Manage Business and Personal Workspaces,” a free analyst webinar on Thursday, June 13, 2013, at 10 a.m. PT.
What Will Be Discussed
- What are the most critical evaluation criteria during BYOD planning?
- How should policy planning interact with tool choice?
- What are the strengths and weaknesses of Mobile Device Management, container-based approaches, and mobile-enabled Web applications?
- What is the role of authentication in a BYOD system?
- How do compliance, industry, and corporate culture factor into BYOD decisions?
Who should attend
- C-level executives
- Mobility managers
- IT managers
- IT decision makers
- IT security professionals
- Enterprise software and technology vendors