BYOD and Next-Generation Mobile Security

  • Wednesday, June 5, 2013 | 1:05 PM – 1:55 PM | Orchid | Room: Room 4203

View all Sessions

We will discuss various ways that enterprise mobile devices can be practically exploited by hackers to compromise user information on the device, and discuss the current state of mobile security solutions. We will talk about various application sandboxing solutions to secure the users' sensitive information and transactions even if the mobile device itself is compromised or hacked into.


This document was retrieved from on Tue, 16 Jul 2019 06:31:11 -0400.