End point security is changing - can you cope?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

The world of end point security is changing rapidly. Microsoft is re-energising its Windows Mobile operating system, whilst the range of Apple iPhone's apps is soaring, as enterprise grade software developers get to grips with the highly flexible iPhone operating system that Apple has created.

Java applications are also empowering budget cellular phones to the point where employees can now buy a mobile phone with powerful wireless (Bluetooth, WiFi and 2G/3G) computing capabilities for under 100 pounds.

Add in the myriad security issues caused by portable storage devices such as iPods (and iPodalikes) plus semi-intelligent USB sticks and it's clear that that the world of enforcing policies and rules on end point security are changing very quickly indeed.

It's against this backdrop that Infosecurity has teamed up with DeviceLock, one of the leading edge end point security specialists, to offer you a webinar that will bring you up to speed on the threats and challenges that the rapidly evolving mobile IT world engenders.

This webinar will:

  • Give attendees a thorough insight into the anatomy of mobile data leaks and how the problem can be countered.
  • Detail the solutions to these security threats.
  • Help you understand the multiple topologies involved, and how an external mobile threat can also become an internal one.
  • Offer you specific advice - via an interactive Q&A session - on the end point security issues that affect your organisation.

This webinar is for:

  • ITsec managers wanting to update themselves on the latest end point security threats - and solutions to those threats .
  • IT managers wishing to better understand the need for policy-based security technology in the end point environment.
  • Anyone wanting to apprise themselves of the latest developments in end point data leak prevention technology.


Danny Bradbury

Danny Bradbury Contributing Writer

Steve Gold

Steve Gold, Infosecurity Magazine

    Alexei Lesnykh

    Alexei Lesnykh Business Development Manager, DeviceLock