The proliferation of consumers using smart phones and iPads has, perhaps inevitably, led to an explosion of mobile adoption in the enterprise. In fact, this so-called “BYOD” (bring your own device) approach to workplace connectivity is increasingly driving enterprise usage of Cloud-based services.
However, with these new opportunities come new questions for enterprise IT. For example: How can I control access to the Web APIs used by mobile apps? How can I secure connections to Cloud-based services? How can I monitor usage in order to protect against malicious attacks or accidental traffic spikes?
On February 8, I’ll be presenting a webinar called Simplifying Enterprise Mobile Access — A How-to Guide, which will provide answers to some of these questions. If you’re interested and you’d like to join me, click the link below to register:
In this webinar, I’ll be drawing on my experience helping large organizations deal with disruptive IT change. From my perspective, it’s clear that giving employees access to corporate data and services via mobile devices will require new thinking on how to leverage existing identity infrastructure, how to protect APIs and how to govern externally-facing IT assets.