Premium Content

Access "Should enterprises give in to IT consumerization at the expense of security?"

Published: 19 Oct 2012

Point: Marcus Ranum Some companies are apparently adopting a policy of allowing employees to do their computing work on personal devices -- a trend that, I suspect, is a result of mainstream IT departments not being quite sure how to accommodate their growing user-base of Apple Computer addicts. Our industry appears to be of two minds about this topic: on one hand, we're worried about data leakage; and on the other, we take steps to make said leakage as easy as possible. I was on a conference call last week, in which a senior technical executive asked me if I had any suggestions for what kind of data leakage system could be put between their Exchange server and their BlackBerry users to detect and block attempts to export sensitive data. As our conversation continued, he said, "Of course, these are corporate-issued BlackBerries. So at least we can do remote-wipe in case of loss." I was struck dumb for a second, trying to sort through the inherent contradiction in simultaneously giving employees a tool for exporting data from the safety of the corporate WAN, ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Strategies for a successful data protection program
    data_protection_2014.png
    E-Handbook

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...

  • Devices, data and how enterprise mobile management reconciles the two
    ISM_supp_1014.png
    E-Zine

    The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...

  • Putting security on auto-pilot: What works, what doesn't
    security_auto-pilot.png
    E-Handbook

    For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...