The good, the bad and the secure of mobile identities
Date: Monday, December 7, 2015
Time: 2:00 p.m. ET/ 11:00 a.m. PT
Take a deeper dive into mobile identity, system architecture, threats and best security practices for mobile application development.
This webinar will help you understand how mobile incorporated into your existing enterprise environment. Entrust Datacard's Jason Soroko will take a deeper dive into mobile identity, system architecture, threats and best security practices for mobile application development.
What Makes Mobile Different — Define the major differences between mobile architecture and that of a desktop.
Applications for an Enterprise Environment — Probe into mobile applications and their uses in a modern mobile business environment.
Staying Ahead of Threats — Uncover the threats to mobile that may affect your business environment.
Best Practices – Find out how to securely develop mobile applications.
Look to the Future — Get an outlook on the capabilities of mobile technology in the pipeline.Speaker:
Jason Soroko, Manager, Security Technologies, Entrust