Doing BYOD Right – Juniper IT Talks About How to Make BYOD Secure and Effective in TCG RSA Panel

Date Published: March, 01, 2014

BYOD continues to be among the hottest topics – and biggest challenges – for security, and the recent RSA Conference was abuzz with ideas about securing all those precious employee devices.

TCG hosted a panel session during its association seminar moderated by analyst Victor Wheatman with discussion from Eric Green, Mobile Active Defense; Rick Doten, DMI; and Jason Conyard, Juniper Networks.

Video of that session is now available athttp://www.trustedcomputinggroup.org/resources/rsa_conference_2014_get_proactive_with_security. Panelists touched on key topics and Conyard has offered a summary of his take on BYOD with some key points for those implementing a secure BYOD program in his own blog.

Read that here: http://juni.pr/1e9cFVX

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More