Access "IT consumerization drives new security thinking"
This article is part of the June 2011 issue of BYOD means creating a new security game plan in the enterprise
About two years ago, Thomson Reuters began tackling a problematic phenomenon that was emerging for enterprises worldwide: Employees bringing their smartphones and other computing gadgets into the workplace. While companies can lock down corporate-owned mobile devices with policies and established technologies such as BlackBerry Enterprise Server, these personally owned systems require a whole new way of thinking. “We knew data would be on devices that we didn’t control and wanted something that was Blackberry-like to manage those devices,” says Tim Mathias, senior director of IT security at Thomson Reuters. “The problem was we didn’t own the device, so we started looking at the technology, policies and standards within the company and challenged ourselves to come up with some policies that would protect the company but allow individuals to use a device of their choice.” The New York-based information giant – which has 55,000 employees in more than 100 countries worldwide – is taking a multi-level approach to deal with the growing issue. In addition to ... Access >>>
Premium Content for Free.
Get actionable results from a security information management system
by Andreas M. Antonopoulos
In order to get the best results, you need to limit your goals for SIM.
Revamped FISMA requirements aim to improve federal security
by Crystal Bedell
An automated tool and mandates for continuous monitoring try to improve federal information security efforts.
- Get actionable results from a security information management system by Andreas M. Antonopoulos
IT consumerization drives new security thinking
by Marcia Savage, Editor
The influx of personal smartphones and other computing devices into the enterprise is forcing a shift in security strategy.
Data breaches show enterprise need for better data security management
by Robert Westervelt, News Director
Sony and other data breaches suggest need for data accountability, better configuration management.
- IT consumerization drives new security thinking by Marcia Savage, Editor
Lack of SMB security opens door to online criminals
by Michael S. Mimoso, Editorial Director
Online criminals have smaller targets firmly in their crosshairs.
Mobility trend takes off in the enterprise but leaves out security
by Chenxi Wang
Banks and other businesses are rushing to jump on the mobility trend but leaving security behind.
Marcus Ranum and Bob Blakley discuss risk management failures
by Marcus J. Ranum, Contributor
Security expert and Information Security magazine columnist Marcus Ranum continues a new bimonthly feature where he goes one-on-one with a fellow security industry insider.
- Lack of SMB security opens door to online criminals by Michael S. Mimoso, Editorial Director
More Premium Content Accessible For Free
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security ...
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...