Mobile Security Strategies in a Zero-Trust World

  • Date 05 Jun 2019

Mobile Security Strategies in a Zero-Trust World

05 Jun 2019, 11:20 - 11:45

Technology Showcase
Language:
English

Mobile devices now generate more corporate traffic than laptops or PCs and an average mobile device connects to more than 100 WiFi networks each year. However traditional security investments such as SWG and EPP don't pay off in this world as devices connect from anywhere at any time. At the same time, Windows 10 adoption is driving workspace management consolidation and many enterprise are looking to unify their mobile and traditional devices under one Unified Endpoint Management (UEM strategy). This is the perfect opportunity to rethink your workspace security strategy and benefit from device-centric technologies such as MTD, CASB and Mobile SWG that are better suited to mobile deployment model. In this session, Wandera will share best practices to help you design a mobile security strategy in a Zero-Trust World.

Learning Outcomes:

  1. Learn the limitations of Secure Web Gateways in today's mobile world
  2. Understand how Windows 10 adoption is driving Unified Endpoint Management (UEM)
  3. Get a better insight into device centric technologies such as MTD and how they can help your business
  4. Learn best practises on securing mobile devices
  5. See real world examples of how businesses are protecting their mobile fleet

 

Contributors

  • Stijn Paumen

    Speaker

    VP of Business Development

    Wandera

    Stijn is responsible for EMEA & APAC sales at Wandera helping enterprise customers across this region implement optimal mobile security strategies to...

Business Issues covered

  1. What will this session help you to do?
    • Deliver security to drive and enable business growth‎
    • Mitigate the effects of new vulnerabilities and exploits‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

Sponsors

Wandera

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.