Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Rapid7 > Three Steps to Address the Challenges with BYOD
 

Three Steps to Address the Challenges with BYOD

Webinar Published By: Rapid7
Rapid7
Published:  Nov 27, 2012
Type:  Webinar

The "Bring Your Own Device" (BYOD) trend started in late 2009 and caught on with users faster than IT expected, especially as iOS and Android devices became dominant.

Today, a majority of companies have employees bringing their own smartphones and tablets to work and while there are clear employee productivity gains, a negative by-product is the significant growth in data security risk. This webinar will delve into the underlying risks associated with BYOD, and provide a simple step-by-step approach to mitigate their risks.

Participants will learn:

  • Trends in Bring your Own Device (BYOD)
  • Underlying risks and growing security threats with BYOD
  • A simple step-by-step approach to mitigate BYOD risks



Tags : 
rapid7, technology, security, it management, business technology