Webinar: How We Learned to Stop Worrying and Embrace Remote Work

March 24, 2020 from 03:00 PM – 04:00 PM UTC
|

Whether it’s a document sent over Slack or a game of conference call bingo unfolding on Zoom, telecommuting infrastructure has permeated our working lives. The workplace and classroom have both transformed overnight from cubicles and desks to couches and kitchens.

As employees or students shift to working or learning from home, a diverse range of endpoints need to be managed and protected – including smartphones, tablets, and laptops. Cloud applications should also be deployed to support those trends—providing business continuity for organizations while enabling a frictionless experience for users. This is accomplished via unified endpoint management (UEM), identity and access management (IAM), and web-centric threat defense working in concert.

Further, it’s just as imperative to effectively secure those applications and the devices users rely on for access—whether an organization-issued laptop or a personal tablet.

A program like bring your own device (BYOD), while implying usage in the office, is more of a concern at home due to the risks of unsecured WiFi, unauthorized users, risky downloads and web traffic, and the potential for phishing attacks to compromise credentials.

However, those same problems tend to crop up on organization-issued devices as well—typically deemed a more secure asset. Ultimately, regardless of the device, the human behind the machine presents the risk.

On March 24th, join IBM experts as they discuss best practices for enabling and empowering remote user productivity without compromising security—and the no-charge products available from IBM Security to assist in this transition.

Register Now

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today