Premium Content

Access "Extending the reach of enterprise security management"

secure_extended_ent_hb_cover.png

In today's extended enterprise, cloud computing is redefining traditional supply chains, data is a currency as well as a risk point and the bring-your-own movement around applications, services and devices is muddying the dividing line between "home" and "office." How can CIOs protect their organizations while also maintaining the flexibility their employees crave? In this SearchCIO handbook, Editorial Director Christina Torode interviews CIOs and analysts for their advice on securing the extended enterprise in its myriad shapes, sizes and technological maturity levels. In addition, CIO Niel Nickolaisen shares his experiences with extending the reach of enterprise security management initiatives while also guaranteeing ease of use. Finally, Forrester analyst Andrew Rose discusses the importance of building a "human firewall" to ensure that everybody has a stake in keeping the enterprise safe.  Access >>>

Table of contents

  • The trials and tribulations of enterprise security
  • Ensuring ease of use: What's a CIO to do?
  • Fortify the human firewall

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free