Access should depend on who they are, what they're doing and also what device they're using, says Proofpoint
VPNs are perfectly fine for protecting traffic between users' devices and the corporate network, but that's only one scenario in use today. More common is a mixed environment with managed and unman...
To continue reading this article...
Join Computing
- Unlimited access to real-time news, analysis and opinion from the technology industry
- Receive important and breaking news in our daily newsletter
- Be the first to hear about our events and awards programmes
- Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
- Access to the Computing Delta hub providing market intelligence and research
- Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders