There are 3 important items for determining what your client integrity strategy is. So how does a CIO bring the complexity of the many options down to a smaller decision path? It is not what you think. In this video I explain how inspecting the users, devices, and AD all fit together.
1. USERS: There are so many types of users trying to access your environment; from business partners, consultants, employees who are allowed access externally and those who are not, kiosks, hotel, conferences.
2. DEVICES: That are allowed access are as varied as the people: Smartphones like Droids, iPhones, Blackberrys, etc.
3. AD: The core of your security strategy is the core and not the edge.
Enjoy the video. I invite your comments. Bill