Presentation-Knowing where the safe zone is – Defining security perimeter access strategies for an e
- Mark Skilton
- Oct 26, 2013
- 1 min read
From 2nd Annual Identity Access Management – Ovum Forum 22 October 2013.

The modern enterprise today has many connections, relationships and services. Information technology has enabled communication, social communities and transactions to create opportunities for new types of value. But this has also changed the types of risks and security issues as bring your own device (BYOD) and the many types of cloud services have shifted responsibilities.
Do you know where the access perimeter of your company security is?
How do you define risk and value of new technology?
What are the opportunities and challenges of new technologies and on legacy operations?
This presentation will look at ways to define the new business – technology boundaries and the risk and challenges of managing new technology across these boundaries.
http://identitymanagement.ovumevents.com/
Comments