Any Device, Any User, Always Secure: Adding Macs and Mobile Devices to Your Existing Management Infrastructure

Sponsored by: Centrify

ITPro Today

April 19, 2015

2 Min Read
Any Device, Any User, Always Secure: Adding Macs and Mobile Devices to Your Existing Management Infrastructure

On-Demand Webinar

Never before have we seen the proliferation of so many new devices with so much power. And while most of these devices are targeted at consumers, both employees and IT organizations are recognizing that these new devices can play a valuable role in empowering business users. Workers want to be able to use Macs, smartphones, iPads and other tablets – not just PCs – to do their work. There are also huge benefits to users and companies in having these devices work seamlessly both inside and outside the corporate firewall.

But can all this really be achieved without compromising security or adding unmanageable amounts of complexity for IT and users? Can workers really use their device of choice while still allowing IT to manage the device and secure the way users access corporate resources and applications?

In this webcast, guest speaker IDC analyst Pete Lindstrom will explore these needs as well as trends in how the marketplace is addressing these challenges. He will be joined by Peter Havens from Centrify Corporation who will discuss how we need to think beyond just easily managing devices. We need to manage the user experience so that every worker has the ability to securely access the tools they need to do their job – from any device, from any location – but do so without any compromise to corporate resources and data.

Register and you will also receive a copy of our just released - NEW - 2015 IT Skills & Salary Report!

Watch Now!

If you have already registered, click here to access

Presenters

Pete Lindstrom is a Research Director for IDC's Security Products program. He is an industry expert and thought leader in the areas of IAM (Identity & Access Management), cloud security, and IoT (Internet of Things) security. Additionally, Mr. Lindstrom is responsible for IDC's BuyerPulse Analysis: Identity and Access Management program. He provides focused research and intelligence to help clarify how IT buyers make purchasing decisions about IAM products.

 

Peter Havens is Director of Product Management at Centrify focused on endpoint management as a part of Centrify’s Identity Service offering. Peter has been focused on enterprise software for endpoint management for most of his career. He started as a software developer focused on server management at Hewlett-Packard and then moved into the Enterprise Mobility Management space with MobileIron. He has a passion for building software that solves tough problems while providing a great user experience.

 

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like