"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of theactivities"--
As more and more business functions move to cloud computing service, the need for and advantages of collaboration using cloud computing have become a major factor in organizational planning. Of interest to mangers of all levels and divisions of an organization, this book gives an overview of collaborative cloud based services. Messier, a security consultant, looks at how businesses can use these cloud services effectively to boost their productivity without jeopardizing the security of their data. The author looks at the various types of collaborative cloud services employees can use to free themselves of geographic constraints to work together. From social media and cloud based storage to remote sessions and virtual servers, these new collaborative services allow employees to work on the same project from thousands of miles away. Messier shows how these remote services can be just as secure and safe to use as traditional in-house services. Annotation ©2014 Ringgold, Inc., Portland, OR (protoview.com)
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.
Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses:
- The evolving nature of information security
- The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP
- Social media and security risks in the enterprise
- The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
- Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions
- Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies
- Explores the risks associated with the use of social media to the enterprise network
- Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements