iPhone

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
5,638
Score:
5

Technology provides consumers the world at their fingertips, so it should come as no surprise that employees—who are really just consumers in disguise—insist on using their personal devices for work. The BYOD trend undoubtedly creates new opportunities and benefits for both employees and companies. But if it’s done wrong, BYOD can also frustrate employees and…

+ read more

Travis Greene
Feb 5, 2015
8:34 am
Reads:
4,273
Score:
Unrated

In his recent blog post, Mike Robinson pointed out that Traditional IT is too Slow and unresponsive for today’s consumers. These consumers increasingly demand immediate gratification, because the consumerization of IT is reshaping their expectations for procurement speed. Think about how easy it is to get an app on your phone: all you need to…

+ read more

jdebaer
By: jdebaer
Feb 10, 2012
10:36 am
Reads:
3,095
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow