Features

Body behind keyboard error

The old saying that 'information technology would be perfect if it weren't for end-users' rears its head again as IT departments attempt to secure devices in the era of distributed networks.

01 February 2008

Your network is everywhere. At its myriad ends are a host of users running around the planet with devices that you do not own, but are expected to secure and support. Welcome to the era of distributed networking, mobile computing and even more chaos than usual.

Most organisations today are faced with a host of end-user devices, from cellphones to PDAs, laptops and iPods that are owned by end-users who expect to be able to use them for work and play in the same way they would use company equipment.

ITWeb Premium

Get 3 months of unlimited access
No credit card. No obligation.

Already a subscriber Log in