Network Security in the Age of *Any* Computing: Index of Posts
It’s hard to believe, but we have wrapped up the initial research on this series dealing with how network security evolves, given the need to provide access to critical information at any time, from anywhere, on any device. We call it any computing. We’ve dealt with the risks and how enforcement and policies will change. And talked quite a bit about integrating these enforcement points into the existing network and security infrastructure. Finally, we wrapped the series yesterday with Quick Wins, about the process of selecting and implementing these technologies. So here is the index of posts. Enjoy. The Risks Containing Access Enforcement Policy Granularity Integration Quick Wins If you missed any of these posts, check out our Complete Feed on the web or via RSS. Then you’ll be sure to get everything we publish. The next step is to assemble these posts, massage a bit, have someone who knows how to write edit the whole thing, and then publish as a white paper. That should happen over the next two weeks. Stay tuned – we’ll post the paper’s availability right here. Share: