This resource is no longer available

SearchSecurity University - Endpoint Devices: Shoring Up the Weakest Link


In a day and age in which "Apple Picking," or the theft of iPhones, is becoming a daily occurrence in cities across the country, IT executives need to evaluate their security policies and lock down measures for stolen devices.

This classroom will explore how to protect mobile endpoints against malware and theft, and what to do before and after a device makes its way into the wrong hands. Via three lessons, gain essential understanding of:

  1. How IT executives can protect their organization against endpoint security threats and set security best practices for managing the myriad endpoint devices entering the workforce
  2. Why IT executives should focus their endpoint security strategy on applications
  3. How data governance can be integrated into solutions for managing endpoint security for the hyper-connected enterprise


Jack Gold President and Principal Analyst, J. Gold Associates LLC

Jack Gold is Founder and Principal Analyst at J.Gold Associates. Gold has more than 35 years in the computer and electronics industries, including work in imaging, multimedia, technical computing, consumer electronics, software development and manufacturing systems. He is a leading authority on mobile, wireless and pervasive computing, advising clients on business analysis, strategic planning, architecture, product evaluation/selection and enterprise application strategies. Before founding J. Gold Associates, he spent 12 years with META Group as a Vice President in Technology Research Services. He also held positions in technical and marketing management at Digital Equipment Corp. and Xerox. Mr. Gold has a BS in Electrical Engineering from Rochester Institute of Technology and an MBA from Clark University.

13 Jun 2013
13 Jun 2013
Virtual Environment

This resource is no longer available.