3 Comments

Summary:

In this webinar, the panelists will explore the challenges exposed by BYOD and help sculpt a framework for evaluating the authentication and management tools available to secure employee-owned devices. They will also discuss how to tailor a BYOD strategy that works for your industry and corporate culture.

smartphone-work

Each BYOD implementation is unique, and there is no one correct solution. BYOD requires a unique blend of policy management, security technology, and outreach and education, and there are several paths to the same goal.

In this upcoming GigaOM Research analyst webinar, our panel will address these BYOD questions:

  • What are the most critical evaluation criteria during BYOD planning?
  • How should policy planning interact with tool choice?
  • What are the strengths and weaknesses of mobile device management, container-based approaches and mobile-enabled web applications?
  • What is the role of authentication in a BYOD system?
  • How do compliance, industry and corporate culture factor into BYOD decisions?

Speakers include:

Register here to join GigaOM Research and our sponsor Centrify for “Security in the age of BYOD: how enterprises can manage business and personal workspaces,” a free analyst webinar on Thursday, June 13, 2013, at 10 a.m. PT.

You’re subscribed! If you like, you can update your settings

  1. I hope this panel will look at startups that are securing the BYOC (Bring Your Own Cloud) part of the BYOD question.

    nCrypted Cloud http://www.ncryptedcloud.com is one of those startups (Full Disclaimer, I work there) and we allow for Separate but Equal protection of User and Enterprise data on a non Enterprise owned device.

    It is free to the consumer and paid subscription to the Enterprise

  2. Tom that looks really interesting, I’ll have to check it out.

  3. What about BYOA? The devices may be authorized and managed by an MDM, but its the applications on the employee-owned devices that I worry about.

Comments have been disabled for this post