For more than 20 years, enterprises have clung to the idea of securing operating systems, networks, storage, communication channels and all the hardware they run on. These investments protected the computing equipment, which is now relatively cheap and easily replaced. The theory went that by securing the equipment and entry points within the enterprise, the information residing therein was safe and secure.

Today’s global business enterprises demand a framework that ensures their IT systems information security addresses the current realities of enterprise, network and information sharing and access.

Register or login for access to this item and much more

All Information Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access