About | Contact | SUBMIT PRESS | Advertise | FAQ
Newsletters | Twitter |
Software | Webmaps | Submit Press | Utilities | Geo BIZ | iOS | Social Media | LBS | Webinars | LiDAR | Cloud  

Top Geo News
Put Your News here! 

Avenza Releases Geographic Imager 4.5 for Adobe Photoshop

Got news? TELL US...
submit press to GISuser

Social Connect

GISuser Sponsor

Recent Site Additions
GISuser Sponsor

GISuser Videos

See also SpatialVideos Youtube

GISuser Sponsor

Home arrow News arrow Webinars and Online Training arrow 5 Best and Worst Bring-Your-Own-Device Mobile Policies     

post a GIS job * THE NEW GEOJOBS.BIZ!!! *  NEW CAREERS at Esri
See THOUSANDS of jobs on GeoJobs.Biz
Submit News/tips to press @gisuser.com
5 Best and Worst Bring-Your-Own-Device Mobile Policies PDF Print E-mail
GIS News - Webinars and Online Training
Written by Perimeter E-Security   
31 December 2012

According to industry estimates, 94% of companies are planning to allow employees to bring their own mobile devices to work by 2013. By following five best practices -- and avoiding five others -- companies can significantly reduce their risks and protect their sensitive company information.

Panelist Information: Andrew Jaquith, CTO at Perimeter E-Security

Duration: 1 hour 7 minutes

Description: Bring-Your-Own-Device (BYOD) is a phenomenon many companies are wrestling with. It's easy to see why. By 2015, 70% of the Internet-capable devices your employees will buy will be made by consumer behemoths such as Apple and Samsung, and not by traditional IT favorites such as RIM, HP, and Microsoft. Meanwhile, many companies have realized that they can save significantly on their telecom expenses if their employees are footing part (or all) of the monthly bill. For a company with 500 employees, that could add up to $300,000 or more annually.

You've probably seen a lot of fear, uncertainty, and doubt (FUD) articles in the press about the terrors of BYOD. If I had a nickel for every article on the topic, I'd be rich -- but without learning anything more about truly solving the problem.

But BYOD isn't complicated. The trick with managing successful BYOD programs is to set clear ground rules, create sensible security policies, and to devise a strategy for navigating the privacy minefield. In this webinar, they will show you an approach that balances technology, policy and privacy. They will describe five best practices every company should employ, and five common traps to avoid. Finally, they'll give you a sneak preview of solutions they will be bringing to market later this quarter.

 Receive Your Complimentary On-Demand Webinar NOWOffered Free by: Perimeter E-Security


< Prev   Next >

 Did you enjoy this article/news and want to stay informed? 
Click to subscribe to the 2X A Week GISuser Today E-Newsletter

Submit Your GIS/Geo News/PR

blog comments powered by Disqus
Geo EDU Tip
To GISP or Not? What Does It Mean To You? 
HOT Devices
Video - Trimble Positions and the Geo Explorer 6000 XH
Social Media Tips
10 Map Services Your Business MUST Be Listed in
Featured Events
  • Trimble Dimmensions - Trimble Dimensions User Conference is the premier event of the year for professionals wishing to stay on top of the most current information on a wide range of technologies. Nov 3-5, Las Vegas, NV.
  • InterGeo 2014 - INTERGEO is the world's leading conference trade fair for geodesy, geoinformation and land management. Oct 7-9, 2014, Berlin

 List Your Event Here 

THE GISuser Newsletter

See Recent edition

subscribe GISuser

We won't share your address!

Popular Stuff!

GISuser Site Sponsor

Partner Sites

lidar news



geojobs Geo jobs


A Spatial Media LLC property

Spatial Media, LLC ©2003 - 2013 All rights reserved / Privacy Statement