Messaging News Webinar--Unified, Secure And Compliant: Maximizing The Benefits Of Unified Communications

Free webinar March 11 to explore how to achieve the benefits of Unified Communications technology without sacrificing security and compliance

CHICAGO (March 4, 2010) - On Thursday, March 11, Messaging News will present a live webinar with IBM and Facetime on how companies are achieving the benefits of Unified Communications, solving the many deployment challenges and managing secure communications of mobile workforces using shared, Web-based resources and social networking features.

WEBINAR DATE AND TIME:
Thursday, March, 11, 2010
7am PST / 10am EST / 3pm GMT

Corporate enterprises increasingly are realizing the benefits of multi-faceted unified communications capabilities from platforms such as IBM Lotus Sametime. UC-enabled enterprises can achieve enhanced flexibility, higher productivity and more effective communication both internally and externally.

However, the bridges built and barriers toppled by UC open the door to new risks as well, specifically the challenges of managing secure communications of mobile workforces using shared, Web-based resources and social networking features to engage with colleagues, partners and customers. New protection schemes and new thinking about application security are necessary to get the most out of the UC revolution.

In this 55-minute webinar, Stephanie Jordan, Editor in Chief of Messaging News, Eric Young, Senior Director of FaceTime Communications, and Brian Aylward, World-Wide UC2 Sales Leader for IBM, will discuss:

* Best practices and deployment issues to consider when rolling out
Unified Communications,

* How Lotus Sametime extends the communications borders of the modern
corporate enterprise, increases productivity, and drives down costs,

* Key security and compliance risks created as UC-enabled workforces
begin to use new applications on the go,

* How to create a security management strategy for UC platforms like
Sametime and for social media to prevent malware, loss of
confidential information and meet compliance requirements, and

* How to address the long-term challenges of managing a UC environment.