{"id":6329,"date":"2014-08-08T12:00:52","date_gmt":"2014-08-08T19:00:52","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=6329"},"modified":"2022-04-07T01:55:29","modified_gmt":"2022-04-07T08:55:29","slug":"watch-safely-enable-mobile-devices-business-use","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/08\/watch-safely-enable-mobile-devices-business-use\/","title":{"rendered":"Watch: How to Safely Enable Mobile Devices for Business Use"},"content":{"rendered":"<p>A true mobile security solution has to manage devices, protect devices and control data, stopping mobile threats and seamlessly tying enterprise security policies to the state of the device.\u00a0Brian Tokuyoshi, senior solutions analyst and expert in mobility and wireless network security, recently visited our lightboard studio to map out how that's accomplished -- and how you can get started with Palo Alto Networks GlobalProtect.<\/p>\n<p>Watch Brian's lightboard video here:<!--more--><\/p>\n<p><a href=\"http:\/\/connect.paloaltonetworks.com\/globalprotect-ondemand-demo\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:55.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-6330 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/brian-lightboard.png\" alt=\"brian lightboard\" width=\"500\" height=\"279\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/brian-lightboard.png 475w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/brian-lightboard-230x128.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/08\/brian-lightboard-71x40.png 71w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>For more on GlobalProtect, visit our <a href=\"https:\/\/www.paloaltonetworks.com\/products\/globalprotect\" target=\"_blank\" rel=\"noopener\">GlobalProtect resources page<\/a> and read <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/author\/brian\/\" target=\"_blank\" rel=\"noopener\">Brian's posts on mobile security topics<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A true mobile security solution has to manage devices, protect devices and control data, stopping mobile threats and seamlessly tying enterprise security policies to the state of the device.\u00a0Brian Tokuyoshi, senior solutions &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[604,76],"tags":[100,301,414],"coauthors":[709],"class_list":["post-6329","post","type-post","status-publish","format-standard","hentry","category-lightboard","category-mobility","tag-globalprotect","tag-mobile-devices","tag-mobile-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6329"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6329\/revisions"}],"predecessor-version":[{"id":6333,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6329\/revisions\/6333"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6329"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}