Street BYOD

Enhancing visibility and control of Shadow IT
Security professionals need to approach Shadow IT with a pragmatic view: How can we better support the business’ needs while keeping risk in check? Sean Duca of Palo Alto Networks has some ideas.
The rise of the superuser, and managing shadow IT
IT departments should deal with ‘shadow IT’ by listening to individuals and teams throughout the business to help ensure employees have access to the latest collaboration tools they want, empowering them to do their jobs more effectively, writes Telstra’s Jim Clarke.
Singapore IT depts struggling to meet employee expectations: Telstra research
New Telstra research of 100 IT decision-makers in Singapore reveals 98% find it a challenge to effectively implement all the technology tools employees expect to use to communicate in the workplace, from telepresence to desktop virtualisation and enterprise social networks.
BYOD: Corporate security and global users’ privacy rights
The economic benefit of BYOD is overpowering the security concerns, but in today’s age of global business, it’s crucial to have a BYOD policy in place that not only protects corporate data, but also follows laws for respecting employee privacy, writes Dell Software’s Matthew Johnston.
Subscribe to SNAP
Download Digerati50 2018-2019 PDF

Digerati50 2018-2019

Get and download a digital copy of Digerati50 2018-2019