Maio 25, 2012

Need to safely allow mobile devices? Tomorrow's webinar will teach you how

Personal mobile devices are flooding the workplace, and IT is still desperately searching for ways to secure them. This surge of mobility greatly increases the attack surfaces in an organization. But too often the security initiatives attempting to address this problem end up focusing on the surface, or the device itself. A phone or tablet is just another piece of equipment. Protecting the data ON the phone is what is important.

Tomorrow, May 30, at 10 a.m. PT/1 p.m. ET, Websense will discuss the latest trends in mobile security. Webinar attendees will walk away with actionable tips for securing highly sensitive data in addition to the device.

Key topics include:

  • The differences between Mobile Data Security and Mobile Device Management (MDM)
  • Tips for approaching Bring Your Own Device (BYOD)
  • How to protect against mobile phishing attacks, malware, malicious apps, and more

The first step to getting secure is identifying your biggest weaknesses, your most sensitive data, and then applying the appropriate protections. While you will never be able to stop the risks entirely, you can reduce risk by understanding where your data is residing and how it’s being used, regardless if it is on your network or a user’s mobile device. Recently enterprises have been turning to highly hyped Mobile Device Management (MDM) solutions for answers. But are these MDM solutions enough?

We look forward to having you join us tomorrow. Until then, I recently heard a CSO say, “…mobile devices themselves do not bring any new threats. It's the points of entry that have increased."

Do you agree or disagree? Feel free to share your comments below, and dont forget to register for the webinar!

Sobre a Forcepoint

A Forcepoint é líder em cibersegurança para proteção de usuários e dados, com a missão de proteger as organizações ao impulsionar o crescimento e a transformação digital. Nossas soluções adaptam-se em tempo real à forma como as pessoas interagem com dados, fornecendo acesso seguro e habilitando os funcionários a criar valor.