The growing popularity of the “Bring Your Own Device” (BYOD) movement is driving enterprise IT teams to rethink their approach to mobile learning access and content delivery. But is this approach saving companies money or causing them undue headaches? The fact that mobile devices are far more prone to being lost or stolen complicates every organization’s security requirements, especially as we all start to deliver proprietary information, courseware, and business intelligence via mobile devices not owned or controlled by an organization.
Participants in this session will explore the various ways IT and management can better prepare, deploy, and support their mobile communities without risking security breaches or increasing support costs. You’ll learn how mobile security has greatly matured in recent months to provide all of the necessary assurances the information security professionals demand. You will also learn about a variety of commercially available options for building and supporting an organization’s own private app store.
In this session, you will learn:
- Which BYOD policies and approaches work and which ones do not
- The various tools and platforms available to launch and support a BYOD program and the advantages of each
- Why mobile apps are more secure than mobile web apps
- Device-level options for associating learner’s devices with their learning accounts
- How single-sign-on authentication can restrict access to learning content and resources
- When time-based restrictions are appropriate and required
- How security is handled across different platforms
Learning professionals ranging from the novice level up to content authors, experienced developers, and IT professionals tasked with securing their mobile learning environments.
Technology discussed in this session:
Apple iOS, Android, BlackBerry, and Windows Mobile/Phone.
You do not have access to these files. Please log in or join with a free membership to download these files.Log In Join