Access your Pro+ Content below.
IT consumerization drives new security thinking
This article is part of the Information Security magazine issue of June 2011
About two years ago, Thomson Reuters began tackling a problematic phenomenon that was emerging for enterprises worldwide: Employees bringing their smartphones and other computing gadgets into the workplace. While companies can lock down corporate-owned mobile devices with policies and established technologies such as BlackBerry Enterprise Server, these personally owned systems require a whole new way of thinking. “We knew data would be on devices that we didn’t control and wanted something that was Blackberry-like to manage those devices,” says Tim Mathias, senior director of IT security at Thomson Reuters. “The problem was we didn’t own the device, so we started looking at the technology, policies and standards within the company and challenged ourselves to come up with some policies that would protect the company but allow individuals to use a device of their choice.” The New York-based information giant – which has 55,000 employees in more than 100 countries worldwide – is taking a multi-level approach to deal with the ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
In order to get the best results, you need to limit your goals for SIM.
The influx of personal smartphones and other computing devices into the enterprise is forcing a shift in security strategy.
An automated tool and mandates for continuous monitoring try to improve federal information security efforts.
Sony and other data breaches suggest need for data accountability, better configuration management.
Columns in this issue
Online criminals have smaller targets firmly in their crosshairs.
Banks and other businesses are rushing to jump on the mobility trend but leaving security behind.
Security expert and Information Security magazine columnist Marcus Ranum continues a new bimonthly feature where he goes one-on-one with a fellow security industry insider.