Asian governments are evolving their approach to managing PII data through legislative frameworks.
Data privacy rules are converging across the region, but the onus for protection still rests squarely with the enterprise.
A fully realized cloud infrastructure promises server, storage and applications (along with all their data) floating in a glorious OpEx soup. Managed from afar, provisioned in minutes, flexible and scalable – there is little to dislike. However, for enterprises operating in multiple jurisdictions in Asia, data protection remains a key issue in planning deployments of cloud solutions. Continue reading “PII in the Sky – A Cloudy Outlook”→
Enterprise IT teams are struggling to manage secured access to enterprise data and systems, standardization of platforms/mobile devices, monitoring personal vs. work related usage and unplanned growth of BYOD devices due to consumerization of IT.
Enterprises are investing in optimizing their business workflows, applications and user interfaces to derive the maximum value out of enterprise mobility initiatives.
Growing usage of individual liable mobile devices, such as smartphones, tablets and in some case even notebooks, is driving the first wave of unplanned adoption. Enterprises are forced to provide access to communication and collaboration applications like email, messaging and conferencing in a secured manner and to develop mobility related policies and guidelines to support usage of personal devices. As a result IT teams are struggling to manage the device and data security, secured access to enterprise systems, standardization of platforms and mobile devices and unplanned growth of BYOD devices due to consumerization of IT. Continue reading “Enterprise Mobility Strategy – An IT Imperative”→
You must be logged in to post a comment.