Register Now

     First Name:
     Last Name:
     Title:
     Company:
     Address:
     Dept/BOX/ MS:
     City:
     State/Prov:
     Zip/Postal Code:
     Country:
     Company URL:
     Phone: - -
     Fax: - -
     Email:

 
How many employees are in your entire organization?*
 
 
   Register for the following
 
   
Part 1: Mobile Security = (Mobile Access Security + Mobile Device Security + Mobile App Security) + Mobile Security Intelligence. No calculator required.
   
Part 2: Do Your Mobile Management and Security Requirements Match Your Business Imperatives?
   
 
An InformationWeek Webcast:

Crossing the Chasm: Designing and Instituting Your Mobile Management & Security Posture
Translating Confidence Into Action

 
Register Now
 
IBM Big Business

Real-World Mobile Security Insights from IBM

InformationWeek Webcasts

Part 1:

Mobile Security = (Mobile Access Security + Mobile Device Security + Mobile App Security) + Mobile Security Intelligence. No calculator required.

Available On Demand
Duration: 60 minutes

Organizations face a whole new set of security and management challenges as mobility becomes an integral aspect of enterprise computing. And both sets of challenges go hand-in-hand. After all, it's hard to secure something that isn't properly managed—and to manage something that isn't properly secured.

Join this open discussion with two of IBM's top mobile security experts to find out how IT organizations are safeguarding their information assets while providing BYOD and non-BYOD users with the productivity-enhancing mobile experiences they need to help their companies successfully compete in today's get-it-done-now business environment.

By attending this webcast, you'll learn:

  • What makes mobile security so different from conventional security
  • How a holistic view of access, devices and apps is critical to mobile success
  • Tips for optimizing the user experience so employees aren't tempted to take unsafe shortcuts
  • Best practices for safeguarding the integrity of your mobile environment—now and in the future

Featured Speakers:

  • Vijay Dheap, Global Product Manager, IBM Master Inventor, IBM Mobile Security
  • Kimber Spradlin, CISA, CISSP, Product Marketing, IBM Endpoint Manager (BigFix)

  • Part 2:

    Do Your Mobile Management and Security Requirements Match Your Business Imperatives?

    Date: Tuesday, February 12, 2013
    Time: 10:00 AM PT / 1:00 PM ET
    Duration: 60 minutes

    Mobility is far from a one-size-fits-all technology. Different organizations implement mobility in different ways—depending on their objectives, culture and technological aggressiveness. That means they also have to take an approach to mobile management and security that fits their particular mobility implementation.

    This webcast gives you the opportunity to listen in as two of IBM's top mobility practitioners discuss smart strategies for aligning your organization's mobility, mobility management and mobility security implementation with your business imperatives.

    By attending this webcast, you'll learn:

    • What it takes to build and sustain a successful enterprise mobility initiative
    • How to better understand risk based on the context of mobile interactions
    • How to launch and sustain an effective mobile security strategy
    • Best practices for ensuring the integrity of apps, devices and data in the new mobile world

    Featured Speakers:

  • Vijay Dheap, Global Product Manager, IBM Master Inventor, IBM Mobile Security
  • Chris Pepin, IBM Mobile Offering Manager and Evangelist

  • Part 3:

    Manage and Secure BYOD while Achieving Data Separation? You can do it!

    Date: Tuesday, February 19, 2013
    Time: 10:00 AM PT / 1:00 PM ET
    Duration: 60 minutes

    New devices, empowered employees, savvy consumers—all of these factors are motivating enterprises to aggressively pursue mobile initiatives. But as they do, they are recognizing that mobility presents as many new challenges as it does opportunities. In particular, many organizations are struggling with the need to support BYOD programs with diverse applications while also executing the kind of data separation necessary to safeguard security and ensure regulatory compliance.

    This webcast features mobility experts with a wealth of expertise about what can go right and go wrong when organizations start delivering enterprise apps and data to employee-owned smartphones and tablets. They'll share lessons learned from real-world mobile deployments—and help you understand the key requirements for safe and successful BYOD programs.

    By attending this webcast, you'll learn:

    • The role of data separation in effective mobile security
    • Practical do's and don'ts for enterprise BYOD
    • How to optimize the manageability and security of mobile apps across the development lifecycle
    • What to watch out for as mobility becomes increasingly pervasive

    Featured Speakers:

  • Naveed Makhani, Senior Product Manager, Tivoli Endpoint Manager
  • Vijay Dheap, Global Product Manager, IBM Master Inventor, IBM Mobile Security


  •