Surviving the Mobile Phenomenon: Shielding Mobile Apps from Critical Vulnerabilities

September 30, 2015 from 03:00 PM – 04:00 PM UTC

Poor coding practices and human error, combined with the relative ease with which hackers find and exploit these vulnerabilities, can make application security the Achilles’ heel of enterprise security initiatives. What’s more, compromised devices can increase the risk of fraud and create an insecure environment for business-critical applications and transactions. Today’s enterprises must be able to verify the security of their own, in-house applications, while also enabling runtime risk detection, tamper resistance and enhanced control via “whitelisting” or “blacklisting” of applications.

Join IBM Mobile Security experts as they:

  • Discuss current state of the mobile security market and threats facing the enterprise
  • Share the 4 key imperatives that must be a part of a holistic mobile security strategy
  • Take a deep dive into the key imperative: “Safeguarding Applications & Data”
Watch On-Demand

Jason Hardy

Market Segment Manager, Mobile Security

Neil Jones

Market Segment Manager, Application Security

Patrick Kehoe

Chief Marketing Officer

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today