In today's extended enterprise, cloud computing is redefining traditional supply chains, data is a currency as well as a risk point and the bring-your-own movement around applications, services and devices is muddying the dividing line between "home" and "office." How can CIOs protect their organizations while also maintaining the flexibility their employees crave? In this SearchCIO handbook, Editorial Director Christina Torode interviews CIOs and analysts for their advice on securing the extended enterprise in its myriad shapes, sizes and technological maturity levels. In addition, CIO Niel Nickolaisen shares his experiences with extending the reach of enterprise security management initiatives while also guaranteeing ease of use. Finally, Forrester analyst Andrew Rose discusses the importance of building a "human firewall" to ensure that everybody has a stake in keeping the enterprise safe. Access >>>
Table of contents
- The trials and tribulations of enterprise security
- Ensuring ease of use: What's a CIO to do?
- Fortify the human firewall
Premium Content for Free.
More Premium Content Accessible For Free
Enabling workforce mobility goes beyond purchasing smartphones and tablets for enterprise staff or initiating bring your own device (BYOD) programs. ...
Rogue technology can wreak havoc on legacy systems and expose companies to serious security threats. Yet business people often need quick, ...
CIOs are taking some tricks of the trade from startups and looking to transform enterprise IT into a creative, entrepreneurial organization. How can ...