August 30, 2013
Webinar - Finding the Right Balance Between Mobility and Security
By Susan J. Campbell, TMCnet Contributing Editor
Mobility is more than just access to entertainment, information and collaboration while on the go. It has become a way of life for most of us. An increasing number of people are dropping their landlines at home, preferring to stay connected via the mobile device. It allows us the flexibility we need, no matter where we need to go.
This kind of flexibility has carried over into the work environment. Many of us are no longer tied to our desks and must be on the move to stay ahead of the competition and in the field with the customer base. This means we need access to communications and the network at all times. For some organizations, that means the adoption of the Bring Your Own Device (BYOD) policies that allow the optimal work/life balance.
But how can today’s enterprises or even small businesses provide employees with the access they need without jeopardizing security? It really is the million dollar question as an increasing number of employees want the flexibility they need while on the go, use apps to manage their work load and store baby pictures in a mobile folder. A separation of the information is critical, yet so is training the user to ensure he or she doesn’t put the network at risk.
Security is the one thing that has limited a number of organizations from going completely mobile. Even with robust mobile device management solutions in place, there are still some companies that struggle to maintain the right approach to usage policies, training among the user base and even control from an IT perspective so that both sides get along. How do you provide the right balance so that IT is happy with the control and security and employees still have the flexibility they need?
To explore these topics and more, “The Evolution of Mobile Security” will be focused on educating the attendee on how to provide the mobility and flexibility users want, while still delivering on the security IT demands.
Edited by Stefania Viscusi