Access your Pro+ Content below.
Extending the reach of enterprise security management
Sponsored by SearchCIO.com
In today's extended enterprise, cloud computing is redefining traditional supply chains, data is a currency as well as a risk point and the bring-your-own movement around applications, services and devices is muddying the dividing line between "home" and "office." How can CIOs protect their organizations while also maintaining the flexibility their employees crave? In this SearchCIO handbook, Editorial Director Christina Torode interviews CIOs and analysts for their advice on securing the extended enterprise in its myriad shapes, sizes and technological maturity levels. In addition, CIO Niel Nickolaisen shares his experiences with extending the reach of enterprise security management initiatives while also guaranteeing ease of use. Finally, Forrester analyst Andrew Rose discusses the importance of building a "human firewall" to ensure that everybody has a stake in keeping the enterprise safe.
Table Of Contents
- The trials and tribulations of enterprise security
- Ensuring ease of use: What's a CIO to do?
- Fortify the human firewall