Consumer Tech Products: An IT Security Nightmare
With social media tools, more handheld gadgets and consumer-grade web e-mail proliferating across businesses faster than powder blue collared shirts at a tech convention, organizations are going to have to come to grips with how to best secure and control these technologies. Where does your company and your customers' companies fit into the whole? A new survey of over 600 IT professionals conducted by Osterman Research on behalf of Proofpoint found that many organizations are learning that they need to use mechanisms beyond blind trust to secure the way consumer-grade technology touches enterprise assets. But at the same time, a number of businesses that have instituted policies with regard to these technologies have still been unable to truly control their use on a day-to-day basis. Here's a look at the state of security amidst the consumerization of IT. Where do you fit?This article was originally published on 2011-07-07
In the channel, HP, Inc. is a storied vendor that has relationships...