article thumbnail

How to Pick the Right Technology to Enable the Remote Workforce

CIO Business Intelligence

Protecting data and monitoring user behavior used to be relatively simple when everyone was behind the corporate firewall. For example, data within software-as-a-service (SaaS) applications can’t be protected by the corporate virtual private network if users are outside the firewall, so access needs to be governed at the user account level.

How To 98
article thumbnail

Security requires long haul planning

Cloud Musings

We also extract data from the Sonicwall firewall on who is accessing what type of data from where. On the other hand, this week I’m in Las Vegas at Peak Performance and will probably log in from my hotel room tonight at 9:00 p.m. This, for instance, may mean using a one-time authentication token.