Episode 3: How do I Know When I’m Under Attack – and Then What Do I Do?

Download this episode

Download Video


Identity management is a foundational component of any Enterprise Mobility strategy. This discussion will focus on the integration we have done across identity, productivity, and management that helps you identify and protect against persistent threats to mobile devices – and the company data accessed by those devices. We'll also examine why this protection is best provided from the cloud.

Watch this webcast to see what cloud-based resources are available for protecting your infrastructure from threats introduced by devices – and what to do about these attacks.

Featuring: Brad Anderson (Corp. VP) and Alex Simons (Dir. of Program Mgmt., Active Directory)



Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.