This resource is no longer available

Five Steps To A Successful BYOD Security Strategy

Cover

The BYOD paradigm has many quantifiable benefits, but introduces new challenges in securing enterprise networks and sensitive data.

How can an organization ensure only approved devices are allowed on the network? Which processes can best manage where sensitive data resides? What tactics work when educating employees?

In this podcast, Craig Mathias countdowns to the top five steps in ensuring a successful BYOD security strategy. The discussion focuses on policies, procedures, and employee education.

Speaker

Craig Mathias Farpoint Group

Craig J. Mathias is a principal with Farpoint Group, a wireless and mobile advisory firm that works with manufacturers, network operators, enterprises and the financial community on technology assessment and analysis, strategy development, product design and marketing, education, training and the integration of emerging technologies into business operations. He is an often-quoted industry analyst and speaker at industry conferences and events.

Vendor:
Symantec Corporation
Posted:
12 Feb 2013
Premiered:
Feb 12, 2013
Format:
Multimedia
Type:
Podcast
Language:
English

This resource is no longer available.