Log In

Please enter your email address to log in:

Email not found, please try again or click Register below.

Register now for full site access.


Join today and gain full site access and stay up to date on IT trends and innovations.

All fields are required

Already a subscriber? Login now for full site access.

Protecting users and data beyond the firewall

With the rise of cloud-based applications, organizations are finding new ways to secure devices and data that are off the corporate network.

Users and applications have escaped the “four walls” of the data center, and that creates a risk/reward scenario for all enterprises.

“Every organization is trying to get their arms around this,” says Scott Harrell, vice president of the Cisco Security Business Group. “They want to leverage the cloud to drive business efficiency and productivity, but without losing visibility and control of their applications and data.”

  • According to Gartner, a whopping 25 percent of corporate data traffic will bypass perimeter security and flow directly from mobile devices to the cloud by 20181.

With the...

Login or Subscribe to see full article.