A constant state of war

A constant state of war
Karl McDermott, head of ICT, Three

Kay Cairns explains why heavy usage of smart devices means there is never a quiet period for unified threat management

Employees have smart devices with them 24 hours a day, potentially exposing sensitive company data to the world constantly. Traditional security systems, such as classic Unified Threat Management (UTM), are no longer enough. Thankfully, a range of tools have come onto the market to protect mobile data while it’s out of the office network.

Please Subscribe or Log in to continue reading

Subscribe Login

Independent journalism every day

With digital access you can read The Business Post whenever, wherever, and however you want.

  • Unlimited access to all sections of The Business Post on desktop, tablet and mobile.
  • Breaking news, comment and analysis from the best Business Post writers seven days a week.
  • Live blogs of major news events
  • Videos and podcasts from some of the industry's most respected journalists such as Tom Lyons, Susan Mitchell and Ian Guider
  • Access to The Business Post's extensive archive​

Related Articles

More from The Business Post