84 percent of organizations are allowing employees to use consumer technology such as iPads, iPhones, Facebook, Twitter and instant messages.
With social media tools, more handheld gadgets and consumer-grade web e-mail proliferating across businesses faster than powder blue collared shirts at a tech convention, organizations are going to have to come to grips with how to best secure and control these technologies. Where does your company and your customers' companies fit into the whole? A new survey of over 600 IT professionals conducted by Osterman Research on behalf of Proofpoint found that many organizations are learning that they need to use mechanisms beyond blind trust to secure the way consumer-grade technology touches enterprise assets. But at the same time, a number of businesses that have instituted policies with regard to these technologies have still been unable to truly control their use on a day-to-day basis. Here's a look at the state of security amidst the consumerization of IT. Where do you fit?
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.