New approaches to enterprise architecture required

With the COVID-19 crisis ongoing, cybersecurity teams are working hard to adapt to a rapidly evolving security landscape. Although more Canadians are coming back into the office, most aren’t (Stats Canada reported that 4.6 million worked from home in July 2020), and for a majority of organizations there will be no mass comeback.

For IT groups this new workplace normal means one thing: an urgent need to ensure the people comprising a completely new enterprise architecture are supported and secured.

Security remains a non-negotiable, and with a vastly expanded attack surface between networks and millions of remote users, the job of keeping things locked down has never been tougher. But security is not the only challenge facing companies now. Also on the minds of IT leaders are the everyday technical and enablement issues — employees needing reliable connectivity as well as access to the right apps and to files housed internally.

It’s an interesting problem. On one side you have these user experience hurdles to overcome; on the other is security. The temptation is always there for IT to cut a few corners and applying one workaround or another in order to fix a user experience issue; doing this, however, can and often does open up backdoors to bad actors.

Interested in learning how to “do the trick” of supporting and empowering system users without compromising overall security? On Tuesday, September 15, ITWC CIO Jim Love, Itergy CEO Ralph Loewen and Curtis Johnston, Distinguished Engineer/Microsoft MVP at Quest will be getting together to cover this ground and more in “People, Not Perimeters.”

Few have the bandwidth to learn through trial-and-error. Key elements like Active Directory, Microsoft Azure or application suites like Microsoft 365 (formally known as Office 365) require new approaches. Fortunately, there are tricks to make new remote and cloud architecture secure, stable, and productive. Why not benefit from the experiences of others who have done this successfully?

Register now for “People, Not Perimeters”

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Glenn Weir
Glenn Weir
Content writer at IT World Canada. Book lover. Futurist. Sports nut. Once and future author. Would-be intellect. Irish-born, Canadian-raised.

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now