Chapter 13. Collaboration Without Confidence

This chapter includes the following topics:

Saying “No Thanks” to the “Culture of No”

One Workforce, Different Needs

Secure Collaboration: Anytime, Anywhere, from Any Device

Countervailing Forces

Policies are vital security measures, but they have obvious limitations—namely, their inability to directly control the behavior of human beings.

As the consumerization of IT trend demonstrates, and Cisco’s research underscores, when it comes to technology, employees often bend or break the rules to do what they want or accomplish what they have been asked to do more quickly and efficiently. The focus is on getting the job done using the best tools available, and workers are often unaware that they ...

Get Securing the Borderless Network: Security for the Web 2.0 World now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.