This resource is no longer available

Five Steps To A Successful BYOD Security Strategy

Cover

The BYOD paradigm has many quantifiable benefits, but introduces new challenges in securing enterprise networks and sensitive data.

How can an organization ensure only approved devices are allowed on the network? Which processes can best manage where sensitive data resides? What tactics work when educating employees?

In this podcast, Craig Mathias countdowns to the top five steps in ensuring a successful BYOD security strategy. The discussion focuses on policies, procedures, and employee education.

Speaker

Craig Mathias Principal, Farpoint Group

Craig Mathias is principal with Farpoint Group, an Ashland, MA-based advisory firm specializing in wireless and mobile technologies, products, services, and systems. Mathias is an internationally-recognized expert on wireless communications and mobile computing, and has published numerous technical and overview articles on a wide variety of topics. He is a well-known and often-quoted industry analyst and frequent speaker at industry conferences and events, as well as in webcasts, webinars, podcasts, and videos.

Vendor:
Symantec Corporation
Posted:
12 Feb 2013
Premiered:
Feb 12, 2013
Format:
Multimedia
Type:
Podcast
Language:
English

This resource is no longer available.