RECRUITERS Post your GeoJob Ad Today
According to industry estimates, 94% of companies are planning to allow employees to bring their own mobile devices to work by 2013. By following five best practices — and avoiding five others — companies can significantly reduce their risks and protect their sensitive company information.
Duration: 1 hour 7 minutes
Description: Bring-Your-Own-Device (BYOD) is a phenomenon many companies are wrestling with. It’s easy to see why. By 2015, 70% of the Internet-capable devices your employees will buy will be made by consumer behemoths such as Apple and Samsung, and not by traditional IT favorites such as RIM, HP, and Microsoft. Meanwhile, many companies have realized that they can save significantly on their telecom expenses if their employees are footing part (or all) of the monthly bill. For a company with 500 employees, that could add up to $300,000 or more annually.
You’ve probably seen a lot of fear, uncertainty, and doubt (FUD) articles in the press about the terrors of BYOD. If I had a nickel for every article on the topic, I’d be rich — but without learning anything more about truly solving the problem.
But BYOD isn’t complicated. The trick with managing successful BYOD programs is to set clear ground rules, create sensible security policies, and to devise a strategy for navigating the privacy minefield. In this webinar, they will show you an approach that balances technology, policy and privacy. They will describe five best practices every company should employ, and five common traps to avoid. Finally, they’ll give you a sneak preview of solutions they will be bringing to market later this quarter.
Receive Your Complimentary On-Demand Webinar NOWOffered Free by: Perimeter E-Security