SlideShare utilise les cookies pour améliorer les fonctionnalités et les performances, et également pour vous montrer des publicités pertinentes. Si vous continuez à naviguer sur ce site, vous acceptez l’utilisation de cookies. Consultez nos Conditions d’utilisation et notre Politique de confidentialité.
SlideShare utilise les cookies pour améliorer les fonctionnalités et les performances, et également pour vous montrer des publicités pertinentes. Si vous continuez à naviguer sur ce site, vous acceptez l’utilisation de cookies. Consultez notre Politique de confidentialité et nos Conditions d’utilisation pour en savoir plus.
In my view, Content is still King!I realize this phrase was coined a few years back, and it may seem dated. But it still holds true today. In business, we all deal with content.What has happened to this phrase now, as opposed to few years ago, it that it has now evolved to: (Next Slide)
Contextual Context is King! Cause we all want the right content, at the right time and on the right device, for:Immediacy of answersimmediacy of decision makingIn other words, what the point of having a Crown, if it’s missing at King’s Coronation? What’s the point having a powerful smartphone, a great tablet, but no access to the content securely, to allow you, empower you to make immediate decisions? That is what this phrase has evolved to!Now, what does this contextual content access means in the terms of todays BYOD crowd? Well it all depends on the persona:
The there are Challenges to implementing the “Secure Content in a Dual Persona Mobile Enterprise Model :The risk is the potential loss of sensitive data, confidential content.And the challenge is about embracing this new Mobile Enterprise model, its productivity and efficiency gains, without the risk of Jeopardizing Security?What’s top of mind of many CISO/CIO and IT decision makers Is how to:avoid the creation of a Shadow IT, Enable synchronization of Files on various devices, with Clouds without Losing ControlManage mobile User segments, their access right and Privileges for Syncing & Access of Corporate DataEnsure Compliance Avoid the dreaded Xmas eve call from the your IT personnel that there’s been a breach, and all users who had Dropbox accounts are not compromised.
Have content, will travel securely sharing mobile content in the cloud.
Have Content, Will Travel: Securely SharingMobile Content in the Cloud Part I TechForum’s Security Forum: Emerging Trends in Enterprise Security