article thumbnail

Effectively Manage All Endpoints, No Matter Where They Are Located

CIO Business Intelligence

However, employees working outside the corporate firewall and other network protections pose some big security challenges, especially for large enterprises. CIOs and CSOs still have to ensure that employees outside of the corporate firewall can do their work securely. The need for a more permanent solution.

article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

David was also Assistant Editor and Staff Reporter at The National Law Journal and a columnist for Law Technology News, writing the long-running Technology on Trial column, for which he won the Bronze Award from the Trade, Association and Business Publications International (TABPI). Mary’s University School of Law. Cyber Security'

Software 257
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How Can CIOs Teach Their Employees About Cybersecurity?

The Accidental Successful CIO

CIOs know that training employees is the key to keeping their network secure Image Credit: Merrill College of Journalism Press Releases. However, no matter how many firewalls we put in place or how effectively we implement two-factor authentication we still need to understand the weakest link in our security system: our employees.

Training 113
article thumbnail

4 tips to improve employee experiences while maintaining security and governance

CIO Business Intelligence

Traditional blanket policies that restrict access to apps outside the corporate firewall are no longer effective in a world where more applications and data are moving to the cloud, and more employees are accessing those apps from outside the office.

article thumbnail

Fountainhead: The End of the Laptop-Centric World?

Fountainhead

She shares these folders with her co-workers as well as client contacts within each company (and who are behind each clients firewall) as interactive project-based workspaces. In these cases, each of Margos clients provides a shared (or dedicated) desktop OS behind their firewall. Cloud Computing Journal. Peter Cochrane.