Educause Security Discussion mailing list archives

application isolation


From: jeff murphy <jcmurphy () BUFFALO EDU>
Date: Wed, 29 Oct 2008 13:26:33 -0400



Is anyone aware of articles discussing the pros/cons of isolating
business computing from non-business computing.

In other words, if you don't want users accessing certain applications
using the same environment that they use to browse the web, read
email, etc, you might force them through Citrix or give them a VM
appliance and only allow access to sensitive systems via those
mechanisms. I'm looking for articles discussing the general problem as
well as opinions on specific ways to address it.

thanks,

jeff

Attachment: smime.p7s
Description:


Current thread: