SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Secure Your Mobile Devices!




                  Emmitt Wells - Practice Director
                   Secure Your Mobile Devices!
                          H1, 4/28/2008




                                                     Agenda

•   In the News
•   What is Endpoint Security?
•   Data Protection
•   Policy
•   Technology Available
•   Summary and Conclusion




                                                              1
Secure Your Mobile Devices
Secure Your Mobile Devices
Secure Your Mobile Devices
Secure Your Mobile Devices
Secure Your Mobile Devices
Secure Your Mobile Devices
Secure Your Mobile Devices
Secure Your Mobile Devices
Secure Your Mobile Devices
Secure Your Mobile Devices

Weitere ähnliche Inhalte

Ähnlich wie Secure Your Mobile Devices

DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoRamsés Gallego
 
Group1 Ss08 Smartphones
Group1 Ss08 SmartphonesGroup1 Ss08 Smartphones
Group1 Ss08 SmartphonesKalun Leung
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia filesApurva Vyas
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Can DRM achieve its security goals?
Can DRM achieve its security goals?Can DRM achieve its security goals?
Can DRM achieve its security goals?blogzilla
 
Telecom Spam Mathan Session2 08 Dec 06
Telecom Spam Mathan Session2 08 Dec 06Telecom Spam Mathan Session2 08 Dec 06
Telecom Spam Mathan Session2 08 Dec 06SANSEXPERT
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
Numerals In Legal Or Financial Documents
Numerals In Legal Or Financial DocumentsNumerals In Legal Or Financial Documents
Numerals In Legal Or Financial Documentslegalinfo
 
The NRB Group mainframe day 2021 - Security On Z - Guillaume Hoareau
The NRB Group mainframe day 2021 - Security On Z - Guillaume HoareauThe NRB Group mainframe day 2021 - Security On Z - Guillaume Hoareau
The NRB Group mainframe day 2021 - Security On Z - Guillaume HoareauNRB
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentawlegalservices
 
Beyond the Internet: Seamless Global Communication
Beyond the Internet: Seamless Global CommunicationBeyond the Internet: Seamless Global Communication
Beyond the Internet: Seamless Global CommunicationJerry Fishenden
 
Total Defense Customer Success Stories - Threat Manager r12: Bandit Lites
Total Defense Customer Success Stories - Threat Manager r12: Bandit LitesTotal Defense Customer Success Stories - Threat Manager r12: Bandit Lites
Total Defense Customer Success Stories - Threat Manager r12: Bandit LitesTotalDefense
 
Appsterdam talk - about the chips inside your phone
Appsterdam talk - about the chips inside your phoneAppsterdam talk - about the chips inside your phone
Appsterdam talk - about the chips inside your phonemarcocjacobs
 
Kodak Annual Report2000
Kodak Annual Report2000Kodak Annual Report2000
Kodak Annual Report2000finance24
 
Electroniquev2
Electroniquev2Electroniquev2
Electroniquev2Mehdi zizi
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 

Ähnlich wie Secure Your Mobile Devices (20)

DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés Gallego
 
Group1 Ss08 Smartphones
Group1 Ss08 SmartphonesGroup1 Ss08 Smartphones
Group1 Ss08 Smartphones
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia files
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Can DRM achieve its security goals?
Can DRM achieve its security goals?Can DRM achieve its security goals?
Can DRM achieve its security goals?
 
Telecom Spam Mathan Session2 08 Dec 06
Telecom Spam Mathan Session2 08 Dec 06Telecom Spam Mathan Session2 08 Dec 06
Telecom Spam Mathan Session2 08 Dec 06
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Redington Value Journal - August 2016
Redington Value Journal - August 2016Redington Value Journal - August 2016
Redington Value Journal - August 2016
 
Numerals In Legal Or Financial Documents
Numerals In Legal Or Financial DocumentsNumerals In Legal Or Financial Documents
Numerals In Legal Or Financial Documents
 
The NRB Group mainframe day 2021 - Security On Z - Guillaume Hoareau
The NRB Group mainframe day 2021 - Security On Z - Guillaume HoareauThe NRB Group mainframe day 2021 - Security On Z - Guillaume Hoareau
The NRB Group mainframe day 2021 - Security On Z - Guillaume Hoareau
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentaw
 
Beyond the Internet: Seamless Global Communication
Beyond the Internet: Seamless Global CommunicationBeyond the Internet: Seamless Global Communication
Beyond the Internet: Seamless Global Communication
 
Total Defense Customer Success Stories - Threat Manager r12: Bandit Lites
Total Defense Customer Success Stories - Threat Manager r12: Bandit LitesTotal Defense Customer Success Stories - Threat Manager r12: Bandit Lites
Total Defense Customer Success Stories - Threat Manager r12: Bandit Lites
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
Appsterdam talk - about the chips inside your phone
Appsterdam talk - about the chips inside your phoneAppsterdam talk - about the chips inside your phone
Appsterdam talk - about the chips inside your phone
 
Kodak Annual Report2000
Kodak Annual Report2000Kodak Annual Report2000
Kodak Annual Report2000
 
Electroniquev2
Electroniquev2Electroniquev2
Electroniquev2
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Smartphone
Smartphone Smartphone
Smartphone
 

Mehr von digitallibrary

SOA: State of the Union
SOA: State of the UnionSOA: State of the Union
SOA: State of the Uniondigitallibrary
 
How to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on TrackHow to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on Trackdigitallibrary
 
Physical Security & IT
Physical Security & ITPhysical Security & IT
Physical Security & ITdigitallibrary
 
Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?digitallibrary
 
How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...digitallibrary
 
FAN - An Architecture for Data Management
FAN - An Architecture for Data ManagementFAN - An Architecture for Data Management
FAN - An Architecture for Data Managementdigitallibrary
 
10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Visiondigitallibrary
 
Virtualization and WAN Optimization
Virtualization and WAN OptimizationVirtualization and WAN Optimization
Virtualization and WAN Optimizationdigitallibrary
 
The Industrialisation of Software Development
The Industrialisation of Software DevelopmentThe Industrialisation of Software Development
The Industrialisation of Software Developmentdigitallibrary
 
The Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware TechnologiesThe Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware Technologiesdigitallibrary
 
Software 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaSSoftware 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaSdigitallibrary
 
The Open Source & SaaS Revolution
The Open Source & SaaS RevolutionThe Open Source & SaaS Revolution
The Open Source & SaaS Revolutiondigitallibrary
 
Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,digitallibrary
 
Lost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendorLost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendordigitallibrary
 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networksdigitallibrary
 
Virtualized Data Centers
Virtualized Data CentersVirtualized Data Centers
Virtualized Data Centersdigitallibrary
 
The On-Demand Project Execution Company
The On-Demand Project Execution CompanyThe On-Demand Project Execution Company
The On-Demand Project Execution Companydigitallibrary
 
Architectures for IP Telephony Deployment
Architectures for IP Telephony DeploymentArchitectures for IP Telephony Deployment
Architectures for IP Telephony Deploymentdigitallibrary
 
Outsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software ProductsOutsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software Productsdigitallibrary
 
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...digitallibrary
 

Mehr von digitallibrary (20)

SOA: State of the Union
SOA: State of the UnionSOA: State of the Union
SOA: State of the Union
 
How to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on TrackHow to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on Track
 
Physical Security & IT
Physical Security & ITPhysical Security & IT
Physical Security & IT
 
Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?
 
How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...
 
FAN - An Architecture for Data Management
FAN - An Architecture for Data ManagementFAN - An Architecture for Data Management
FAN - An Architecture for Data Management
 
10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision
 
Virtualization and WAN Optimization
Virtualization and WAN OptimizationVirtualization and WAN Optimization
Virtualization and WAN Optimization
 
The Industrialisation of Software Development
The Industrialisation of Software DevelopmentThe Industrialisation of Software Development
The Industrialisation of Software Development
 
The Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware TechnologiesThe Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware Technologies
 
Software 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaSSoftware 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaS
 
The Open Source & SaaS Revolution
The Open Source & SaaS RevolutionThe Open Source & SaaS Revolution
The Open Source & SaaS Revolution
 
Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,
 
Lost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendorLost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendor
 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks
 
Virtualized Data Centers
Virtualized Data CentersVirtualized Data Centers
Virtualized Data Centers
 
The On-Demand Project Execution Company
The On-Demand Project Execution CompanyThe On-Demand Project Execution Company
The On-Demand Project Execution Company
 
Architectures for IP Telephony Deployment
Architectures for IP Telephony DeploymentArchitectures for IP Telephony Deployment
Architectures for IP Telephony Deployment
 
Outsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software ProductsOutsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software Products
 
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
 

Kürzlich hochgeladen

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Secure Your Mobile Devices

  • 1. Secure Your Mobile Devices! Emmitt Wells - Practice Director Secure Your Mobile Devices! H1, 4/28/2008 Agenda • In the News • What is Endpoint Security? • Data Protection • Policy • Technology Available • Summary and Conclusion 1