{"id":50068,"date":"2024-11-30T15:00:37","date_gmt":"2024-11-30T22:00:37","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=resources&#038;p=50068"},"modified":"2024-12-04T00:58:10","modified_gmt":"2024-12-04T07:58:10","slug":"byod-security-webinar","status":"publish","type":"resources","link":"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar","title":{"rendered":"Protect the Data, Not the Device: BYOD Laptop Security"},"content":{"rendered":"\n\t\t<div  class=\"block-4e9c6b16-1f04-4e93-8fda-5a959b89eee0 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-55964205-c482-48bc-a37f-829bdd2155fd areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-56e8af5f-6b24-4e78-9d61-5305f18972ea row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div id=\"breadcrumbs\" class=\"block-b514dd46-7047-46a4-89f2-34f10db3d577 col areoi-element resource-breadcrumbs col-sm-12\">\n\t\t\t\n\t\t\t\n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\">Resources<\/a><\/span> &gt; <span><a href=\"https:\/\/www.syteca.com\/en\/resources\/webinars\">Webinar<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\">Protect the Data, Not the Device: BYOD Laptop Security<\/span><\/span><\/div>\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c63f40d7-581f-4c7c-bb00-b02a745a4911 col areoi-element col-12 col-lg-6 col-xl-6\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-center text-lg-start has-text-color\" style=\"color:#4790ea;font-size:17px;font-style:normal;font-weight:600\">Webinar<\/p>\n\n\n\n<h1 class=\"wp-block-heading text-center text-lg-start\"><strong>Protect the Data, Not the Device: BYOD Laptop Security<\/strong><\/h1>\n\n\n\n<p class=\"p-poppins py-2 text-18-15\">In today\u2019s remote work era, securing sensitive data on BYOD (Bring Your Own Device) laptops while maintaining productivity and meeting compliance standards like SOC, HIPAA, and PCI is a significant challenge. Join Venn and Syteca to explore how integrating Syteca\u2019s monitoring solution with Venn\u2019s Secure Enclave can protect work data, ensure compliance, and safeguard privacy on unmanaged devices.<\/p>\n\n\n\n<p class=\"p-poppins py-2 text-18-15\"><\/p>\n\n\n\n<p><strong>Key takeaways <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>BYOD Risks:<\/strong> Learn the main security challenges<\/li>\n\n\n\n<li><strong>Stay Secure and Compliant:<\/strong> Meet SOC, HIPAA, and PCI on BYOD<\/li>\n\n\n\n<li><strong>Protect Privacy:<\/strong> Secure work data, keep personal activities private<\/li>\n\n\n\n<li><strong>Track Productivity:<\/strong> Monitor performance and reduce insider risk without privacy concerns<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group block-share-social-buttons align-items-lg-start is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-4b2eccd6 wp-block-group-is-layout-flex\">\n<p class=\"p-poppins mb-2\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Share:<\/p>\n\n\n\n<ul class=\"wp-block-social-links has-icon-color has-icon-background-color ms-2 ms-lg-0 is-layout-flex wp-block-social-links-is-layout-flex\"><li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-linkedin  mx-2 mx-lg-0 wp-block-social-link\"><a rel=\"http:\/\/www.linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fhow-to-manage-insider-risks-in-banking-and-finance%2F&amp;title= noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-facebook  mx-2 mx-lg-0 wp-block-social-link\"><a rel=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fhow-to-manage-insider-risks-in-banking-and-finance%2F noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-twitter  mx-2 mx-lg-0 wp-block-social-link\"><a rel=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fhow-to-manage-insider-risks-in-banking-and-finance%2F&amp;text= noopener nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?text=https%3A\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li><\/ul>\n<\/div>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div style=\"--bs-bg-opacity:0\"  class=\"block-23908a0e-8976-4292-b0cb-78c14770eb79 col areoi-element block-white-papers-form col-12 col-lg-6   bg-body\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-f504a026-f7ed-4d90-ae80-63c7ae04e5f2 areoi-element hs-white-pares-form pb-3\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    portalId: \"612026\",\n    formId: \"2162f19b-1b0b-424c-9a1e-ee94d398bf2e\"\n  });\n<\/script>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e3cc8aa8-93f6-4f47-b69b-3d8d9571f902 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c58b81a5-0144-4240-96b7-f2325c19ea47 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-97b9ddc0-084f-41bc-bf26-c3dd49a067c8 col areoi-element col-12 col-lg-5\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"595\" height=\"750\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/30145158\/595x750-popup-Webinar-Venn-1-1.png\" alt=\"\" class=\"wp-image-50120\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/30145158\/595x750-popup-Webinar-Venn-1-1.png 595w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/30145158\/595x750-popup-Webinar-Venn-1-1-238x300.png 238w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><\/figure>\n<\/div>\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a6578ce9-8a5d-4bbb-8726-d7c9bf5ddde4 col areoi-element block-description-bg col-12 col-lg-7 order-1 order-lg-0\">\n\t\t\t\n\t\t\t\n\n<p><\/p>\n\n\n\n<h2  class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#548ff9\" class=\"has-inline-color\">About featured <\/mark>companies<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Venn<\/strong><\/p>\n\n\n\n<p><em>Christopher Johnson &amp; Heather Howland<\/em><\/p>\n\n\n\n<p>Venn revolutionizes how businesses enable BYOD workforces, removing the burden of buying and securing laptops or dealing with virtual desktops thanks to Blue Border\u2122 technology.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br><strong>Syteca<\/strong><\/p>\n\n\n\n<p><em>Vlad Yakushkin and Marina Yucel<\/em><\/p>\n\n\n\n<p>The Syteca platform provides advanced user activity monitoring (UAM) and robust privileged access management (PAM) solutions to organizations in every industry and sector.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t","protected":false},"featured_media":50172,"menu_order":0,"template":"","class_list":["post-50068","resources","type-resources","status-publish","has-post-thumbnail","hentry","resource_category-webinars"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect the Data, Not the Device: BYOD Laptop Security | Syteca<\/title>\n<meta name=\"description\" content=\"Join Venn and Syteca to explore how integrating Syteca\u2019s monitoring solution with Venn\u2019s Secure Enclave can protect work data, ensure compliance, and safeguard privacy on unmanaged devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect the Data, Not the Device: BYOD Laptop Security | Syteca\" \/>\n<meta property=\"og:description\" content=\"Join Venn and Syteca to explore how integrating Syteca\u2019s monitoring solution with Venn\u2019s Secure Enclave can protect work data, ensure compliance, and safeguard privacy on unmanaged devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-04T07:58:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/27025346\/OG-Webinar-PAM-Roadmap.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar\",\"url\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar\",\"name\":\"Protect the Data, Not the Device: BYOD Laptop Security | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/04005549\/IN-Venn_creatives-11.jpg\",\"datePublished\":\"2024-11-30T22:00:37+00:00\",\"dateModified\":\"2024-12-04T07:58:10+00:00\",\"description\":\"Join Venn and Syteca to explore how integrating Syteca\u2019s monitoring solution with Venn\u2019s Secure Enclave can protect work data, ensure compliance, and safeguard privacy on unmanaged devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/04005549\/IN-Venn_creatives-11.jpg\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/04005549\/IN-Venn_creatives-11.jpg\",\"width\":1200,\"height\":630,\"caption\":\"byod security webinar\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Resources\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protect the Data, Not the Device: BYOD Laptop Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect the Data, Not the Device: BYOD Laptop Security | Syteca","description":"Join Venn and Syteca to explore how integrating Syteca\u2019s monitoring solution with Venn\u2019s Secure Enclave can protect work data, ensure compliance, and safeguard privacy on unmanaged devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar","og_locale":"en_US","og_type":"article","og_title":"Protect the Data, Not the Device: BYOD Laptop Security | Syteca","og_description":"Join Venn and Syteca to explore how integrating Syteca\u2019s monitoring solution with Venn\u2019s Secure Enclave can protect work data, ensure compliance, and safeguard privacy on unmanaged devices.","og_url":"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar","og_site_name":"Syteca","article_modified_time":"2024-12-04T07:58:10+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/27025346\/OG-Webinar-PAM-Roadmap.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar","url":"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar","name":"Protect the Data, Not the Device: BYOD Laptop Security | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/04005549\/IN-Venn_creatives-11.jpg","datePublished":"2024-11-30T22:00:37+00:00","dateModified":"2024-12-04T07:58:10+00:00","description":"Join Venn and Syteca to explore how integrating Syteca\u2019s monitoring solution with Venn\u2019s Secure Enclave can protect work data, ensure compliance, and safeguard privacy on unmanaged devices.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/04005549\/IN-Venn_creatives-11.jpg","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/11\/04005549\/IN-Venn_creatives-11.jpg","width":1200,"height":630,"caption":"byod security webinar"},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/byod-security-webinar#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Resources","item":"https:\/\/www.syteca.com\/en\/resources\/%resource_category%"},{"@type":"ListItem","position":2,"name":"Webinar","item":"https:\/\/www.syteca.com\/en\/resources\/webinars"},{"@type":"ListItem","position":3,"name":"Protect the Data, Not the Device: BYOD Laptop Security"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources\/50068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/resources"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/50172"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=50068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}