top of page

Presentation-Knowing where the safe zone is – Defining security perimeter access strategies for an e

  • Writer: Mark Skilton
    Mark Skilton
  • Oct 26, 2013
  • 1 min read

From 2nd Annual Identity Access Management – Ovum Forum 22 October 2013.

žThe modern enterprise today has many connections, relationships and services. Information technology has enabled communication, social communities and transactions to create opportunities for new types of value. But this has also changed the types of risks and security issues as bring your own device (BYOD) and the many types of cloud services have shifted responsibilities.

  • Do you know where the access perimeter of your company security is?

  • How do you define risk and value of new technology?

  • What are the opportunities and challenges of new technologies and on legacy operations?

žThis presentation will look at ways to define the new business – technology boundaries and the risk and challenges of managing new technology across these boundaries.

http://identitymanagement.ovumevents.com/

 
 
 

Comments


Featured Posts
Recent Posts
Archive
Search By Tags
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square

Mark Skilton    Copyright 2019  ©

  • White Twitter Icon
  • White Facebook Icon
  • White LinkedIn Icon
  • White YouTube Icon
  • White LinkedIn Icon
bottom of page