<img alt="dcsimg" id="dcsimg" width="1" height="1" src="//www.qsstats.com/dcsuuvfw300000gkyg9tnx0uc_3f7v/njs.gif?dcsuri=/index.php/c/a/Research/Affirmative-Action/8&amp;WT.js=No&amp;WT.tv=10.4.1&amp;dcssip=www.cioinsight.com&amp;WT.qs_dlk=XJZTIdQaSoT@0ioO2b@4bwAAAAM&amp;">

Finding 5

By Guy Currier  |  Posted 06-12-2008 Print

Compliance Is the New Risk

The rise in mobility hasn't jeopardized corporate security, and IT shops continue to devote substantial efforts to make sure it won't. It has, however, made regulatory compliance more of a challenge. Besides securing mobile access, businesses are grappling with the need to integrate mobile devices with internal systems, as well as to support various types of mobile devices.

To batten down the hatches, IT departments are taking more control over configuration, and requiring VPNs and password protection.


Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.