Consumer Tech Products: An IT Security Nightmare

  • By

    Ericka Chickowski

    | Posted 2011-07-07
No Title
84 percent of organizations are allowing employees to use consumer technology such as iPads, iPhones, Facebook, Twitter and instant messages.
With social media tools, more handheld gadgets and consumer-grade web e-mail proliferating across businesses faster than powder blue collared shirts at a tech convention, organizations are going to have to come to grips with how to best secure and control these technologies. Where does your company and your customers' companies fit into the whole? A new survey of over 600 IT professionals conducted by Osterman Research on behalf of Proofpoint found that many organizations are learning that they need to use mechanisms beyond blind trust to secure the way consumer-grade technology touches enterprise assets. But at the same time, a number of businesses that have instituted policies with regard to these technologies have still been unable to truly control their use on a day-to-day basis. Here's a look at the state of security amidst the consumerization of IT. Where do you fit?

Submit a Comment

Loading Comments...

By submitting your information, you agree that channelinsider.com may send you channelinsider offers via email, phone and text message, as well as email offers about other products and services that channelinsider believes may be of interest to you. channelinsider will process your information in accordance with the Quinstreet Privacy Policy.

Thanks for your registration, follow us on our social networks to keep up-to-date