Endpoint Security , Enterprise Mobility Management / BYOD , Open XDR

Proactive Mobile Threat Defense

IBM and Wandera Combine to Stop Threats Before They Can Do Harm
Proactive Mobile Threat Defense
Michael Covington of Wandera and John Harrington Jr. of IBM Security

From malware and phishing to cryptojacking and man-in-the-middle attacks, mobile threats are rampant, and organizations need to stay a step ahead. Traditional threat management has been reactive. But IBM and Wandera have joined forces to stop threats dead in their tracks before they get close to your environment.

Hear John Harrington, Jr, Product Marketing Manager, IBM Security; and Michael Covington, Vice President of Product, Wandera as they discuss:

  • The evolution of the enterprise threat landscape;
  • The fundamental elements and tools of proactive mobile defense;
  • How to make the shift from reactive to proactive.

Covington, Ph.D., is vice president of product for Wandera, which specializes in mobile security and data management. He previously held leadership roles at Intel Labs, Cisco Security and Juniper Networks. With a diverse background as a published computer science researcher and an IT professional, Covington has experienced technology from all sides, and he specializes in bringing innovations to market in the areas of mobility and connectivity.

Harrington has spent the past eight years working for an industry-leading Software-as-a-Service based unified endpoint management provider, specializing in product marketing. In this capacity, he works closely with product development and offering management counterparts to develop creative assets and messaging that differentiate IBM MaaS360 with Watson as the industry's first and only cognitive UEM solution. He represents IBM through his participation in live educational webcasts, industry events, conferences and trade shows, and is a blog contributor on SecurityIntelligence.com.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.