CHAPTER SUMMARY
While the basic ideas of controlling access, protecting data, and managing devices remain the same across all organizations, larger and more risk-averse organizations require an approach that meets both the heightened need for security and the increased need for scalability and management. This is not only due to the fact because that larger organizations, by definition, have more people, but also that those people tend to have more devices, access more services, and have more interactions. Larger organizations also have higher rates of churn (employees who join and leave the company), which creates the need for processes and policies to ensure that “anonymous” employees are not left to their own devices. (No pun intended.)
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access