Enterprise Architecture for Data Security in a BYOD World

About this Resource

It is almost a tautology to state that Information Security should be part of Enterprise Architecture. After all Security is an aspect of systems behavior and the Enterprise Architecture discipline is specifically focused on identifying, planning and managing the span between required, implemented and needed behaviors of information systems.

In this white paper Karl Schulmeisters looks at ways in which the rapidly expanding use of “Bring Your Own Device” (BYOD) technology is changing how security fits into the Enterprise Architecture practice. He also looks at some approaches that Enterprise Architects should consider as they design and re-architect systems. 

Already a Member? Sign in here

Related Resources

Enterprise Architecture for Data Security in a BYOD World
  • Register to Download

  • The email address is already in use, please login
  • Checking your email address . . .

  • Please add your Job Title

  • Please add your Industry

  • Please add an Interest

  • Please add your Country

  • * Minimum 6 characters long, including lower and uppercase letters, a number and symbol (!/=+_-@ )

  • Please complete missing fields
  • Passwords need to be minimum 6 characters long, including lower and uppercase letters, a number and symbol.

DEMO Search