Interop ITX 2017 Schedule Builder

Interop ITX 2017 Schedule Builder

View, browse and sort the Interop agenda by track, pass type, format, session day/time, and conference journey. With the Interop ITX Schedule Builder, you can build your schedule in advance and access it during the show via export or in your Interop ITX Mobile App.

In order to best utilize Schedule Builder, please use the login credentials you've set up on this page as your login credentials on the Interop ITX App. You can download the app on iTunes or Google Play.

All SessionsSpeakersMy Schedule
View Sessions As:
  • Updating Your Endpoint Security Strategy: Is the Endpoint a New Breed, Unicorn, or Endangered Species?

    Location:  Room 114
    Format: Conference Session
    Conference Journeys: IT Operations
    Track: Security
    Pass Type: All Access, Conference - Get your pass now!
    Vault Recording: TBD
    Audience Level: IT Operations

    The very concept of "what is an endpoint" has rapidly evolved and radically expanded since you created your first BYOD policy. The industry is now full of endpoint and Internet of Things security products touting new features, but with so many choices, what features matter? How do you know which endpoint security features best meet your organization's needs, use cases, and governance? Do you even know what your organization's use cases are?

    In this session, see how others are addressing these challenges and how you can too. Learn how security and general IT teams can work together to create an endpoint security strategy that helps your organization face the threats and embrace the opportunities of the future. Get a tour through the endpoint protection technology "feature soup" and what testing has shown about these tools. Learn how security architects can adapt protections to suit different use cases, regulatory requirements and risk tolerance.

    Stop reacting and start protecting – your incident response teams will thank you for it.