Follow us on TwitterWatch our You Tube ChannelAdd us on Linkedin

PLATINUM SPONSORS

  • clicksoftware

GOLD SPONSORS

  • moka5
  • centrix-software
  • mdsl-logo

SILVER SPONSORS

  • excitor
  • meru-networks
  • oxford-computer-group
  • anatole
  • gwava
  • arqiva
  • wandera
  • globo

MEDIA PARTNERS

  • snia
  • isf
  • enterprise360
  • network-computing
  • bcw
The UK’s leading Enterprise Mobility and Mobile Device Management event for business and technology professionals

With the western European market for enterprise mobility management and security set to reach £468m in 2015, enterprise mobility is becoming essential, though implementing security, policy and compliance across a diverse set of devices, networks and applications remains a hurdle.

Our 3rd bi-annual Enterprise Mobility and Mobile Device Management will feature exciting case studies about how to secure, monitor, manage and support mobile devices, and impart insights on how mobility can be utilised to help your business performance. Our unique programme is designed to inform the non-technical mind with the complexities of mobile device management while at the same time allowing technology professionals to learn and share best practice.

Register NOW
Download the sponsorship packages
Meet the sponsors
WM Community

Enterprise Mobility and Mobile Device Management is aimed at senior business, technology and operational leaders of corporations who are charged with purchasing, deploying and managing mobility and the mobile workforce in their enterprises.

FEATURED TOPICS

  • BYOD, BYOA, CYOD.
  • Enterprise Mobility Management.
  • Mobile Device Management (MDM).
  • Secure Access Gateways, Identity and Access Management (authentication, authorisation, auditing).
  • Device inventory and inventory maintenance.
  • Mobile optimisation, virtual desktop management.
  • Audit, Compliance and Regulation: Establishing robust corporate policies.
  • Risk and Governance.
  • Legal considerations and liabilities.
  • Workforce evolution with mobility and desktop virtualisation.
  • Improving business performance, productivity.
  • Software distribution.
  • Application management and control.
  • Email management.
  • Wireless security.
  • Containerisation, provisioning and encryption management.
  • Data and intellectual property protection.
  • Defending against malware, spam, phishing, viruses.
  • Data recovery, tracking and remote lock, find, wipe.
  • mPos, Payment Security, Opportunities and Risks
  • Wearable Technologies

FEATURED SPEAKERS

  • Andrew became Senior Technology Officer at the ICO in November 2012, with the responsibility to contribute technical expertise within the ICO. His main areas of work are advising colleagues on information security aspects of complaints and data breach investigations, and research on how new developments in technology might impact information rights. Between 2008 and 2012, Andrew worked as a security tester, gaining valuable insight into real-world information security issues. He was also a primary contact responsible for explaining security concepts to sometimes non-technical customers. Andrew is the lead author of the ICO’s Privacy in mobile apps guidance and the report Protecting personal data in online services: learning from the mistakes of others.

    a pat