Sponsored by SearchConsumerization.com
As users store increasing amounts of data to the cloud, enterprise IT must develop strong policies and procedures for guaranteeing access and security. Administrators can consider cloud-based, on-premises and hybrid file-sharing systems. Admins should also pay attention to factors such as security controls, mobile device management and data security. This chapter describes how to review consumer file-sharing apps and Software as a Service offerings to make sure they comply with corporate policies and regulatory requirements. Access >>>
Premium Content for Free.
Access Other Available Chapters
Privacy regulations and concerns about leaks of sensitive information have raised the priority of data loss prevention as enterprises adopt cloud and...
Cloud services are still a lawless frontier for many organizations. As with the consumerization of IT, companies need to first determine what is best...
New cloud-based services offer serious conveniences for users and potential pluses for corporate IT. These services -- including Amazon Simple ...
More Premium Content Accessible For Free
Assess mobile devices before developing a management strategy
Before an organization can formulate a bring your own device policy, it needs to know what workers are using to access corporate networks, ...
Adopting enterprise mobility management
The number and types of devices touching the enterprise continue to proliferate, so a mobility assessment is the first step in preparing a ...
Mobile application delivery: The next frontier
Just as mobile device management deals with the proliferation of laptops, smartphones and tablets in the enterprise, mobile application management is...