Premium Content

Access "Regain control with a secure file-sharing system"

This chapter is included in the "Corporate data in the consumer cloud" E-Book.
regain_control_ebook_cover.png

Sponsored by SearchConsumerization.com

As users store increasing amounts of data to the cloud, enterprise IT must develop strong policies and procedures for guaranteeing access and security. Administrators can consider cloud-based, on-premises and hybrid file-sharing systems. Admins should also pay attention to factors such as security controls, mobile device management and data security. This chapter describes how to review consumer file-sharing apps and Software as a Service offerings to make sure they comply with corporate policies and regulatory requirements.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Access Other Available Chapters

More Premium Content Accessible For Free

  • Assess mobile devices before developing a management strategy
    adopting_enterprise_mobility_management_ch1.png
    E-Chapter

    Before an organization can formulate a bring your own device policy, it needs to know what workers are using to access corporate networks, ...

  • Adopting enterprise mobility management
    adopting_enterprise_mobility_management_ch1.png
    E-Book

    The number and types of devices touching the enterprise continue to proliferate, so a mobility assessment is the first step in preparing a ...

  • Mobile application delivery: The next frontier
    mobile_application_delivery.png
    E-Handbook

    Just as mobile device management deals with the proliferation of laptops, smartphones and tablets in the enterprise, mobile application management is...