O'Reilly logo

Securing the Borderless Network: Security for the Web 2.0 World by Tom Gillis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Collaboration Without Confidence

This chapter includes the following topics:

Saying “No Thanks” to the “Culture of No”

One Workforce, Different Needs

Secure Collaboration: Anytime, Anywhere, from Any Device

Countervailing Forces

Policies are vital security measures, but they have obvious limitations—namely, their inability to directly control the behavior of human beings.

As the consumerization of IT trend demonstrates, and Cisco’s research underscores, when it comes to technology, employees often bend or break the rules to do what they want or accomplish what they have been asked to do more quickly and efficiently. The focus is on getting the job done using the best tools available, and workers are often unaware that they ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required