Juniper Networks, like many large companies, faces the same BYOD challenges as business large and small. With many of its employees distributed across the globe and on the go, it was obvious a few years ago that the company would have to work with the BYOD trend rather than against it. How could the company leverage its own innovation, technology and industry standards to ensure its networks, data and systems would remain safe while satisfying productivity and mobility requirements?
At next week’s RSA Conference association session, TCG will host a panel, Mobile Security: Fact or Fiction, as part of its Mon., Feb. 24 session. In Room 2018 of Moscone West, independent security analyst Victor Wheatman will challenge Juniper’s IT VP Jason Conyard along with Rick Doten of DMI and Eric Green of MobileActive Defense and SC World on just how to satisfy user’s requirements with enterprise security best practices.
Register now for RSA to attend this session – attendees with Expo or conference passes can attend. More info and a link to RSA registration with a code here: /rsa-conference-2014/
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.