Any Device, Any User, Always Secure: Adding Macs and Mobile Devices to Your Existing Management Infrastructure


Never before have we seen the proliferation of so many new devices with so much power. And while most of these devices are targeted at consumers, both employees and IT organizations are recognizing that these new devices can play a valuable role in empowering business users. Workers want to be able to use Macs, smartphones, iPads and other tablets – not just PCs – to do their work. There are also huge benefits to users and companies in having these devices work seamlessly both inside and outside the corporate firewall.

But can all this really be achieved without compromising security or adding unmanageable amounts of complexity for IT and users? Can workers really use their device of choice while still allowing IT to manage the device and secure the way users access corporate resources and applications?

In this webcast, guest speaker IDC analyst Peter Linstrom will explore these needs as well as trends in how the marketplace is addressing these challenges. He will be joined by Peter Havens from Centrify Corporation who will discuss how we need to think beyond just easily managing devices. We need to manage the user experience so that every worker has the ability to securely access the tools they need to do their job – from any device, from any location – but do so without any compromise to corporate resources and data.

    Please complete the form below to access this research:

    Business E-mail Address

    First Name

    Last Name


    Company Size

    Job Title







    Business Phone

    By clicking on the “submit” button above, I agree that I have carefully read the Legal Notices, and the Privacy Policy, and I agree to be legally bound by all such terms.