- Budgeting, Planning & Forecasting
- Enterprise Accounting Software
- Financial Management Solutions
- Small and Medium Sized Business Accounting Software
- Treasury, Cash and Risk Management
- Business Activity Monitoring (BAM)
- Business Intelligence Software
- Business Process Management (BPM)
- Enterprise Performance Management
- Reporting and End-User Query Tools
- RFID-- Radio Frequency Identification
- Warehouse Management Software
- Customer Experience Management (CEM)
- Customer Information Management
- Sales and Marketing Software
- Enterprise Asset Management (EAM)
- Facilities Management and Maintenance
- Electronic Medical Billing Systems
- Healthcare Inventory Management
- Employee Benefits Administration
- Employee Relationship Management (ERM)
- Learning Management Systems (LMS)
- Workforce Planning and Management
- Human Resources and Payroll Software
- Enterprise Content Management
- Information Lifecycle Management
- Advanced Planning and Scheduling
- Manufacturing Enterprise Resource Planning (MERP)
- Integrated Manufacturing Solutions
- Product Life Cycle Management (PLM)
- Project Management Solutions
- Resource Planning and Scheduling
- Web, Video and Audio Conferencing
- Database Planning and Implementation
- Cloud Computing Applications
- Enterprise Application Integration
- Enterprise Application Integration Middleware
- Service Oriented Architecture (SOA)
- Business Service Management (BSM)
- Business Technology Optimization
- Enterprise Architecture Management (EAM)
- Enterprise Resource Management
- Enterprise Resource Planning (ERP)
- Information Technology Infrastructure Library (ITIL)
- IT Service Management (ITSM)
- Project Portfolio Management (PPM)
- Technology Planning and Analysis
- BYOD (Bring Your Own Device)
- Managed Service Provider (MSP)
- Network Configuration Management Software
- Fraud Detection & Prevention
- Intrusion Detection and Prevention
- IT Security Frameworks and Standards
- Threat and Vulnerability Management
- Virtual Private Network Security
- Data Centre & Storage Solutions
- Network Attached Storage (NAS)
- Remote and Offsite Data Storage
- SAN Virtualization and Consolidation
- Application Lifecycle Management (ALM)
- Application Performance Management (APM)
- Enterprise Systems Management
- Software Configuration Management (SCM)
- Software as a Service (SaaS)
- Web Applications Architecture
- Wireless Application Development
- Electronic Catalog Management
- Electronic Commerce Interchange (EDI-XML)
- Data Center Power Management
Provided by Check Point Software Technologies
Category Threat and Vulnerability Management
Type Webinar
Length
Publish Date June 02 2016
Date posted May 13 2016
Date: Thursday, June 02, 2016, 2:00 PM BST / 3:00 PM CEST
As smartphones and tablets become more powerful, securing devices and data is critical for enterprise mobility stakeholders. For instance, more than half of all decision makers in a recent IDC survey experienced security and compliance issues during mobility rollouts. With savvy cybercriminals using vulnerabilities in apps, networks, and operating systems to gain control of mobile devices, businesses need security that integrates with existing systems for continuous protection. Join this webinar to learn:
Please click "View Webinar" button below to register to attend the live Webinar on June 02, 2016 at 2:00 PM, BST / 3:00 PM CEST
Webinar Presenters:
Rob Westervelt, Research Manager, Information Security at IDC
Robert Westervelt is a Research Manager within IDC’s Security Products group. He provides insight and thought leadership in the areas of cloud security, mobile security, data protection, and security related to the Internet of Things (IoT). Rob is also responsible for research and analysis around a wide range of evolving security markets, including endpoint security, Web security and specialized threat analysis and protection. Rob has more than a decade of experience in the IT security industry as an award winning journalist covering the information security market. Rob holds a degree in journalism from the University of Connecticut. He is also a U.S. Air Force veteran.
Michael Shaulov, Head of Mobility Product Management, Check Point Security Technologies
![]()
Michael Shaulov is Head of Mobility Product Management at Check Point Security Technologies. He leads product strategy for Check Point’s mobile security solutions including Check Point Mobile Threat Prevention. He is a recognized industry speaker, delivering talks at RSA Conference, BlackHat and Infosec. Prior to his role at Check Point, Michael was the CEO and co-founder of Lacoon Mobile Security, which was acquired by Check Point in April 2015. Prior to that, Michael led the Mobile Intrusive Interception team for the security division of NICE Systems LTD. Before his commercial endeavors, Michael pioneered the mobile security field in an elite military technological unit, where he received the Israeli Presidential Excellency Honor for his contributions. He holds a BSc in Computer Sciences and Physics from Ben-Gurion University, Israel.
Aaron Goldberg, Contributing Editor, IDG SMS
Aaron Goldberg is a renowned industry and marketing analyst in the information technology industry, spending more than 30 years working with senior executive management at IT vendors and many IT professionals as well. He is well known for his succinct and realistic style, and his ability to distill the key issues for end customers, marketers, and IT staff. He also runs many face-to-face CIO Roundtables, and events for Senior IT Professionals each year in topics such as Servers, Virtualization, Security, Cloud, Printing/Output, Enterprise Software, Data Center Operations, Business Intelligence, and others. Mr. Goldberg spent the first 15 years of his career at IDC running the Desktop/Printer/Peripherals Group. He then went to Ziff-Davis, in 1992, as CEO of InfoCorp, their market research company. Mr. Goldberg joined the Ziff corporate headquarters team in 1999 to develop state of the art marketing programs and content, driven by customer’s real world issues, for virtually all leading IT vendors. He launched Content4IT in 2012.
Rupert Goodwins’ unique angle on tech change
Jon Collins’ in-depth look at tech and society
Would a Brexit be bad for UK tech?






Most Recent Comments
Love the term "jihobbiest" -- it's clever and catchy, a nice portmanteau of "jihad" and... well, I ASSUME you mean to use the word for "someone...
Christopher Chiesa on Insight: The ‘jihobbiests’ that run ISIS’s social accounts
Galaxy s7 very good phone i used it
meme on Samsung S7: Rumours & reality
I hope she rebounds too - my first reaction to this story was - oh they got her - the bastards ! Based on the sure knowledge that if you represent...
vcragain on Theranos and the great media circus is tiring
First, a tangential comment: this may very well be an Asian thing, I agree. I'm told that the US is a generation behind e.g. Japan, in Internet...
Christopher Chiesa on Rant: The Internet Fridge Fallacy
I was there from ICL (Scandinavia), 22 years old, demonstrating Office 2000 with Outlook Dashboard and how you could comment in a word document...
Niklas on Rant: The Internet Fridge Fallacy
Insurance comparison in one portal on the rise, the more conscious people who triggered it.
Garasi Otomotif on Indonesia is priming itself for a fintech future