
Summary Bullets:
- Trends such as the ‘bring your own device’ (BYOD) movement put more IT power into the hands of end users. However, making IT resources more accessible can significantly increase the risk of breaches.
- Having a handle on data security in what today are extremely porous environments requires more than sophisticated technology; enterprises also need to have the right policies and practices in place to avoid the most prevalent cause of incidents: human error.
Access is everything in IT today, with organizations placing a premium on the ability to tap into enterprise resources from virtually any location and a multitude of different device types. This extensible approach to enterprise IT is meant to support more productive and agile operating models. However, for all the potential value technologies such as mobility can bring to an organization, there is also risk associated with allowing end users and their often unmanaged devices rights to direct entry to critical resources. Continue reading “Balancing the Need for Access and Security in the Age of IT Consumerization”
You must be logged in to post a comment.