Access your Pro+ Content below.
Consumerization of IT requires new security model
This article is part of the March 2011 issue of Information Security magazine
Amylin, a diabetes specialist pharmaceutical company, is busy developing e-detailing applications -- applications that provide physicians with information about its products -- for iPads. Sales reps who often have to squeeze their visits into a doctor's busy schedule love the capability to walk and talk with the doctor, all the while showing a flashy presentation on the iPad. The new world of mobile tablets, like the iPad, hold much appeal over the old ways of bulky flipcharts and heavy laptops. Amylin would see a positive ROI just by eliminating the need to print detailing materials every year. Amylin is not alone. Almost every Fortune 500 companies has a strategy to utilize social, mobile, video and cloud technologies, either to optimize operations or better customer reach. This is what Forrester Research refers to as the "Empowered movement," where companies are empowering their employees with modern, consumer-oriented technologies to better serve their customers. According to a recent Forrester online survey, nearly 40 ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
There are a lot of risk assessment frameworks out there. Here's what you need to know in order to pick the right one.
VMs introduce a new security dynamic, one that emphasizes asset discovery, change management and tweaks to existing security technology.
Attacks on applications like Adobe Reader and Java require effective and timely patching of user systems.
Columns in this issue
Security managers should take advantage of the consumerization of IT trend to reinvent themselves.
Cloud computing is forcing an evolution of information security practices and technology.
A new competition tries to foster interest in cybersecurity early on.
Here are four things you need to do in order to execute on your long-term career plan.