Enjoy a delicious cup of coffee while catching up with your IT-professional peers and visiting with our vendors, before beginning your day of education and networking.
Over 20 years of experience successfully driving revenue growth and strategic account acquisition with leading wireless and telecommunications companies.
The mobile enterprise challenges are mounting: enabling users simple and secure access to the network, ensuring applications run smoothly, and building sufficient capacity to handle usage and growth. A superior level of Wi-Fi design is required—something shown to be lacking by a recent report: “By 2015, 80% of newly installed wireless networks will be obsolete because of lack of proper planning.” An indication of the problem is that a wireless user is provisioned with less than 5% of the bandwidth of a wired user. This session will examine critical design components to ensure predictable performance, even under heavy loads.
Hack attacks – and in particular Advanced Persistent Threats (APTs) – are on the rise, eroding reputations and looting organizational and customer assets with disturbing regularity. With mobility the new norm and native-device-level mobile security in its relative infancy, are BYOD enterprises inviting APT attacks? Mobile devices potentially open the organizational network to an entirely new set of security risks that challenge both IT professionals and C-suite executives to plan strategically and move proactively. This session examines effective new approaches to redefine the network perimeter, gain real time network visibility and insight into who and what is on it, and control access automatically. Importantly, the session offers proven strategies for preventing and controlling APTs and other infections – whether from mobile devices, an online users’ “bad click” or other common hack attack strategies. Through new network visibility and control, organizations can secure their network and assets while supporting the productivity and freedom that mobility promises and users expect.
Join your IT peers for a complimentary luncheon including assorted sandwiches, salads, and dessert. This is a perfect opportunity to interact with other technology professionals in a relaxed environment.
As a special thank you to all of our guests at The IT Summit, our sponsors have arranged for a prize drawing for you, our valued supporters. The prizes are different at every conference, but in the past have included items such as iPods, golf clubs, sporting event tickets, and eReaders.
CenturyLink is the third largest telecommunications company in the United States and is recognized as a leader in the network services market by technology industry analyst firms. The Company is a global leader in cloud infrastructure and hosted IT solutions for enterprise customers. CenturyLink provides data, voice and managed services in local, national and select international markets through its high-quality advanced fiber optic network and multiple data centers for businesses and consumers. The company also offers advanced entertainment services under the CenturyLink® Prism™ TV and DIRECTV brands. Headquartered in Monroe, La., CenturyLink is an S&P 500 company and is included among the Fortune 500 list of America’s largest corporations.
Relaxing and enjoying drinks with your IT-professional peers is a great way to wind up The IT Summit San Diego.