In Partnership With:



Take command and control of BYOD with IAM and authentication

Participating Company:

451 Research


Ping Identity


Participating Analyst:

Wendy Nather

Loading the player ...

BYOD (Bring Your Own Device) often represents a loss of control for the enterprise in terms of security and it can increase support costs as the IT department has to learn about various tablets, laptops and smartphones. But at the same time it can represent a cost saving. Can mobile devices really be used widely for identity and access management (IAM) and can it be used as a factor in authentication? Joining Wendy Nather in this intellectual debate are Eric Olden from Symplified, Lloyd Burch for NetIQ, and Patrick Harding of Ping Identity.

Topics: Identity & Access Management

Publications from 451 Research and NetIQ

Sign up to receive the Enterprise Management 360˚ ‘Weekly Digest’ direct to your inbox every Thursday. This contains news on the latest industry trends, interviews with key thinkers, white papers and videos. Unsubscribe at any time

Email address