May

142013

Best Practices to Maintain Control Over Android, iOS and Windows Tablets and Smartphones

Date: May 14, 2013

Hosted by: Citrix

Register now

Consumer devices, including tablets and smartphones, play an increasing role in enterprise computing, providing greater flexibility, mobility, and productivity for people. But they also create new security challenges for IT. For organizations to realize the full value of bring-your-own device (BYOD), IT must ensure that these benefits don’t come at the expense of information security.

Join this session to find out how IT can maintain control and protect business information accessed from Android, Apple iOS and Windows tablets and smartphones. 

What you will learn

  • Security considerations and risk mitigation options when supporting BYOD
  • The architecture required to support tablets and smartphones accessing sensitive business information
  • How Citrix BYOD solutions enable secure access to enterprise desktops, apps and files from any device
  • Best practices for IT to maintain control over Android, Apple iOS and Windows tablets and smartphones used in the workplace

Speaker

Kurt Roemer, Chief Security Strategist, Citrix

Take our short survey and enter to win your choice of an iPad Mini or a Nexus 7.

The survey will open in a new window so you can continue browsing the website.

Take the Survey No Thanks

Sweepstakes Rules

 
Login ID
Password
Select Destination (Optional)