Ornamental dots. Two rows of three dots. The top row is a light blue. The bottom row is one light blue dot followed by two orange dots. Press

Forescout Sponsors SANS Webcast: “Architecting a Flexible Strategy for Securing Enterprise and Personal Mobile Devices (BYOD)”

Cupertino, Calif. — September 5, 2012 — Nearly everyone has personal devices that they want to be able to use for work.  Whether it’s their smartphone, personal laptop or the tablet they got for their birthday, employees want to be able to use their own device, connect to the corporate network and conduct business.  While personal mobile devices use can help boost productivity, organizations that quickly endorse BYOD can introduce serious security gaps.  So what kinds of BYOD risks need to be managed, how can you obtain BYOD policy acceptance, and how can you limit mobile device exposures?

A new SANS webcast, “Architecting a Flexible Strategy for Securing Enterprise and Personal Mobile Devices (BYOD),” will answer these questions and more.  The expert session will examine BYOD trends and risks, the mobile security landscape, policy development and control options. The session will also present a tiered service approach to enterprise mobile security, where complementary controls can offer necessary network and device level defenses to enable IT organizations the means to realize mobility advantages and reduce security threats.

The webcast will be led by guest speaker Phil Hochmuth, security program analyst at IDC, who will be joined by Scott Gordon vice president at Forescout Technologies Inc.

This SANS webcast, sponsored by Forescout, will take place on Thursday, September 14, 2012 at 1:00 PM EDT/10:00 AM PDT.  Forescout invites users and media to register for the webcast at: //www.forescout.com/byodflex.   As a special bonus, registrants will receive a complimentary, in-depth IDC white paper on the issues presented.

The webcast presents proven process and technology considerations that InfoSec professionals can put to immediate use. Other topics that will be addressed include:

  • Real-world issues, considerations and operational impact
  • Policy development processes to tolerate, support or embrace BYOD
  • Why combine NAC, MDM and other technical controls
  • How to devise tiered security service strategy

About Forescout Technologies, Inc.
Forescout enables organizations to accelerate productivity and connectivity by allowing users to access corporate network resources where, how and when needed without compromising security.  Forescout’s automated solutions for network access control, mobile security, endpoint compliance and threat prevention empower IT agility while preempting risks and eliminating remediation costs.  Because the Forescout CounterACT platform is easy to deploy, unobtrusive, intelligent and scalable, it has been chosen by more than 1,300 of the world’s most secure enterprises and military installations for global deployments spanning 37 countries.  Headquartered in Cupertino, California, Forescout delivers its solutions through its network of authorized partners worldwide.  Learn more at www.forescout.com

Forescout Technologies, Inc. is a privately held Delaware corporation. Forescout, the Forescout logo, CounterACT and ActiveResponse are trademarks of Forescout. Other names mentioned may be trademarks of their respective owners.

Demo Request Forescout Platform Top of Page