Who Are You? Managing Identity and Access in a Socially Connected BYOD World
Original Event Date: May 16, 2013
For all the bottom-line benefits of BYOD and the consumerization of IT, the challenges of managing identify and access for the explosion of devices – and their users – has been a great one.
With employees integrating social networks like LinkedIn and Facebook as part of their business regimen, the opportunities for introducing problematic software into the enterprise has grown exponentially.
With an increasing number of users relying on multiple devices – PCs, smartphone and tablets – to get their jobs done the number of authorized, guest and "unknown" logins to your network are no doubt growing out of control.
How can you tame the identity beast while keeping users, clients and partners safely connected – and keeping the bad guys out?
Join this timely eSeminar sponsored by CDW to learn about the latest methodologies and best practices to create and automatically enforce 21st century identity and access polices that give you visibility into what's happening on your network now, and tools to ensure only trusted devices and users have access to sensitive data.
Attendees will learn:
Where today's identity and access threats are coming from
Methods for managing and monitoring guests on the wired or wireless network
Whether "non-user" devices like cameras and sensors are safe or being "spoofed"
Where to start to ensure policies are enforced and users are safe from themselves
Register now for this complimentary event, and bring your questions for our expert to address during the live Q&A following the presentation.
Shiloh Jackson - Solutions Architect, CDW
Michael Krieger - VP, Market Experts Group, Ziff Davis Enterprise