Five key assumptions to make when considering mobility security

John Leonard
clock

Imation's Jon Fielding sets out some key truths to consider when formulating security strategy

However you choose to roll out enterprise mobility, be it BYOD, COPE, CYOD, virtual desktops, Windows to Go USB sticks or any of the other myriad strategies, the thought processes and strategies around...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Law

Although Facebook has faced many lawsuits over personal data collection in the past, this is the first time Zuckerberg has been sued personally
Law

DC attorney general sues Mark Zuckerberg over Cambridge Analytica scandal

The lawsuit claims Zuckerberg directly participated in key decisions and was aware of the risks of sharing users' data.

clock 24 May 2022 • 3 min read
Sharon Barber named as the co-Chair of the National Cyber Advisory Board

Sharon Barber named as co-Chair of the National Cyber Advisory Board

She presently serves as the Chief Resilience & Security Officer at Lloyd Banking Group

clock 13 May 2022 • 2 min read
Industry Voice: Interview: Michel André of Banking Circle discusses the 10x performance improvements of cloud

Industry Voice: Interview: Michel André of Banking Circle discusses the 10x performance improvements of cloud

Intel
clock 06 May 2022 • 2 min read