This web seminar is available on-demand - Click here to register and watch
Make no mistake, consumerisation of the workplace is one genie that is not about to go back into the bottle.
The rate of advance of consumer IT and the divergence between personal devices and the sort of beige boxes that are typically used in the workplace are both set to increase. This means that restrict-and-ban approaches to locking down the network are doomed to failure. Worse, they may be counterproductive to the business. Instead, IT teams must look at security in a different way, developing a holistic model that encompasses policy, education, technology and enforcement.
During this web seminar we look at each of these aspects with a view to coming up with a best practice guide. We will also be showing you how you can gauge the maturity of your security systems, enabling you to plug any holes before your precious data starts to leak through them.
Jez Clement, Head of IT Security, Towergate Partnership
Alan Bentley, Senior Vice President of International Sales, Lumension
Stuart Sumner, Chief Reporter, Computing
David Mcclelland, Consulting Editor, Computing
Click here to register and watch for free
Sometimes, the power of the mainframe is the most cost effective answer. Computing's Peter Gothard puts Computing's readers' questions on the future of the mainframe to IBM's Z13 expert Steven Dickens.
This Dummies white paper will help you better understand business process management (BPM)