Our second webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” looks at In-Depth Risk Analysis, and takes place on June 26, 2019 from 10:00-10:30 am CDT.
Mobile devices are subject to risks that other enterprise endpoints are not. Mobile devices are now the de facto platform for productivity in business. Today, the traditional computing devices (e.g., servers, desktops and laptops) upon which enterprises have focused their security and compliance efforts represent only 40 percent of the relevant endpoints. The remaining 60 percent of devices are mobile.
Organizations and government agencies are realizing mobile devices are an unprotected endpoint with access to or containing all of the information of a traditional endpoint. And while there are some overlaps in what you protect – email, calendars, etc., – the way you solve the traditional endpoint security problem is completely different than how you solve the mobile security problem.
Users regularly incur risk on mobile devices, such as by:
- Connecting to unknown and unencrypted networks;
- Downloading unvetted apps, and apps from third-party stores; and
- Jailbreaking or rooting their devices, and remaining on vulnerable operating systems (OS’s)
These and similar actions increase the likelihood of attacks. Register Now for this webinar and you’ll learn how to construct an RFP for an effective enterprise mobile security solution that can address and mitigate these risks.
JT Keating, Vice President of Product Strategy and someone who has responded to literally hundreds of RFPs, will lead the session and answer questions.