Sponsored by SearchConsumerization.com
As users store increasing amounts of data to the cloud, enterprise IT must develop strong policies and procedures for guaranteeing access and security. Administrators can consider cloud-based, on-premises and hybrid file-sharing systems. Admins should also pay attention to factors such as security controls, mobile device management and data security. This chapter describes how to review consumer file-sharing apps and Software as a Service offerings to make sure they comply with corporate policies and regulatory requirements. Access >>>
Premium Content for Free.
Access Other Available Chapters
Privacy regulations and concerns about leaks of sensitive information have raised the priority of data loss prevention as enterprises adopt cloud and...
Cloud services are still a lawless frontier for many organizations. As with the consumerization of IT, companies need to first determine what is best...
New cloud-based services offer serious conveniences for users and potential pluses for corporate IT. These services -- including Amazon Simple ...
More Premium Content Accessible For Free
Maintaining control over mobility and the cloud
Not only do workers expect to be able to access enterprise applications and data from any device, anywhere, they also store data and access apps in ...
The next mobility model: COPE challenges BYOD
As the initial excitement about the bring your own device trend dies down, alternate approaches to mobility are emerging. The corporate-owned, ...
Juggling management and benefits of BYOD in the enterprise
Employees using tablets and smartphones for work, whether through an official bring your own device strategy or not, provides IT the opportunity to ...