sponsored by SearchConsumerization.com
Posted:  25 Mar 2013
Premiered:  25 Mar 2013
Format:  Multimedia
Type:  Virtual Environment
Language:  English

Enterprise mobile device management (MDM) systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.

View this expert classroom, put together by SearchConsumerization.com’s editorial team, to gain insight on how to take control of BYOD with MDM technology.


Sponsored by: BlackBerry


Andrew Hay
Senior Security Analyst, The 451 Group

Andrew Hay is a Senior Security Analyst for 451 Research's Enterprise Security Practice (ESP). Hay provides technology vendors, private equity firms, venture capitalists and end users with strategic advisory services – including competitive research, new product and go-to-market positioning, investment due diligence and tactical partnership, and M&A strategy. 

Bill Oates
CIO, City of Boston

Bill Oates Bio: Bill Oates is the Chief Information Officer for the City of Boston, Massachusetts. Oates was named Boston’s first Cabinet level CIO by Mayor Thomas M. Menino in June of 2006. As CIO, Oates is charged with spearheading the City’s technology initiatives and is responsible for the delivery of IT services in support of the various city functions. Under Bill’s leadership, the City of Boston has been recognized as a leader in leveraging technology to improve citizen engagement and access to services. Prior to joining the City, Oates served as the Senior Vice President & Chief Information Officer for Starwood Hotels & Resorts Worldwide, Inc. A graduate of Boston College, Oates is also an attorney and member of the Massachusetts Bar. He received his JD from Suffolk University Law School in Boston and was awarded his LL.M in Global Technology Law in 2005. 

Acceptable Use Policies | Access Control | Configuration Management | Email Security | Handheld Device Security | Handheld Devices | Mobile Device Management | Mobile Device Management Software | Mobile Workers | Security | Security Best Practices | Security Policies | Security Threats | Smart Phones | Tablet PC

View All Resources sponsored by SearchConsumerization.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement