Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Devices

  • Webcast Aired Tuesday, 09 Feb 2016 1:00PM EST (09 Feb 2016 18:00 UTC)
  • Speakers: Lee Neely, Mic McCully

The ubiquitous use of mobile devices has radically changed the landscape of data protection, and the abundance of applications only complicates the situation. Regrettably, not every application is what it seems. Users can't always detect a well-crafted forgery or application that secretly exfiltrates data in addition to the displayed functions. Additionally, not every network is what it seems. Users stumble across illegitimate networks that a intercept or even change legitimate communications from mobile devices. And even legitimate operating systems and applications have numerous vulnerabilities that can be exploited.

How, then, can mobile device data be protected? This webcast reviews the current and emerging services and practices designed to help secure and protect the data on these devices, and identifies areas where solutions are needed to fill the remaining gaps and provides recommendations for a holistic approach including mobile threat protection.

Attendees will learn:
  • What role security tools such as analytics can play in managing mobile devices
  • What the risks are to mobile devices
  • How mobile devices and data are currently protected and how effective those protections are
  • Common attack vectors and possible mitigation strategies
  • Features and capabilities that a solution should have to provide organizations with ideal mobile security and visibility

View the associated whitepaper here.