I have been alpha testing some new tech recently and ran into wildly different levels of user endpoint security across global enterprise environments. None of the endpoint security surveys I found included practical strategies and policy practices restricting user access to external cloud applications, browser extensions, desktop apps and mobile apps. I wrote a quick survey covering these and hope that you are as interested as I am in seeing how corporations are enabling departments to remain competitive while protecting sensitive information from potential leaks. This survey does not require registration and consultants or contractors such as myself who access multiple client environments are invited to submit multiple responses as long as they cover active environments. Respondents get immediate access to the ongoing survey results and can sign up to get the final results without registering at the eDiscovery Journal.  

 So please answer 4 quick questions on the Enterprise Cloud Security Survey. 

Greg Buckles wants your feedback, questions or project inquiries at Greg@eDJGroupInc.com. Contact him directly for a free 15 minute ‘Good Karma’ call. He solves problems and creates eDiscovery solutions for enterprise and law firm clients. 

Greg’s blog perspectives are personal opinions and should not be interpreted as a professional judgment or advice. Greg is no longer a journalist and all perspectives are based on best public information. Blog content is neither approved nor reviewed by any providers prior to being published. Do you want to share your own perspective? Greg is looking for practical, professional informative perspectives free of marketing fluff, hidden agendas or personal/product bias. Outside blogs will clearly indicate the author, company and any relevant affiliations.  


See Greg’s latest pic on Instagram. 

0 0 votes
Article Rating