In Partnership With:

 
 
Menu 

Audio

Take command and control of BYOD with IAM and authentication


Participating Company:

451 Research

NetIQ

Ping Identity

Symplified


Participating Analyst:

Wendy Nather



Loading the player ...

BYOD (Bring Your Own Device) often represents a loss of control for the enterprise in terms of security and it can increase support costs as the IT department has to learn about various tablets, laptops and smartphones. But at the same time it can represent a cost saving. Can mobile devices really be used widely for identity and access management (IAM) and can it be used as a factor in authentication? Joining Wendy Nather in this intellectual debate are Eric Olden from Symplified, Lloyd Burch for NetIQ, and Patrick Harding of Ping Identity.

Topics: Identity & Access Management

Publications from 451 Research and NetIQ

Sign up to receive the Enterprise Management 360˚ ‘Weekly Digest’ direct to your inbox every Thursday. This contains news on the latest industry trends, interviews with key thinkers, white papers and videos. Unsubscribe at any time

Email address