In today's extended enterprise, cloud computing is redefining traditional supply chains, data is a currency as well as a risk point and the bring-your-own movement around applications, services and devices is muddying the dividing line between "home" and "office." How can CIOs protect their organizations while also maintaining the flexibility their employees crave? In this SearchCIO handbook, Editorial Director Christina Torode interviews CIOs and analysts for their advice on securing the extended enterprise in its myriad shapes, sizes and technological maturity levels. In addition, CIO Niel Nickolaisen shares his experiences with extending the reach of enterprise security management initiatives while also guaranteeing ease of use. Finally, Forrester analyst Andrew Rose discusses the importance of building a "human firewall" to ensure that everybody has a stake in keeping the enterprise safe. Access >>>
Table of contents
- The trials and tribulations of enterprise security
- Ensuring ease of use: What's a CIO to do?
- Fortify the human firewall
Premium Content for Free.
More Premium Content Accessible For Free
Software governance has meant more than the management of company-commissioned applications for quite some time. As the number of online services ...
Managing IT services has always required meeting users where they want those services. But in the age of cloud, mobile and self-service IT, ...
Is your enterprise ready to derive top dollar from your data? Infonomics is the field that treats corporate information as a valuable asset, but how ...