Take command and control of BYOD with IAM and authentication

Application Management, Security Management

Participating Company:

451 Research


Ping Identity


Participating Analyst:

Wendy Nather

Loading the player ...

BYOD (Bring Your Own Device) often represents a loss of control for the enterprise in terms of security and it can increase support costs as the IT department has to learn about various tablets, laptops and smartphones. But at the same time it can represent a cost saving. Can mobile devices really be used widely for identity and access management (IAM) and can it be used as a factor in authentication? Joining Wendy Nather in this intellectual debate are Eric Olden from Symplified, Lloyd Burch for NetIQ, and Patrick Harding of Ping Identity.

Publications from 451 Research and NetIQ