Educause Security Discussion
mailing list archives
From: jeff murphy <jcmurphy () BUFFALO EDU>
Date: Wed, 29 Oct 2008 13:26:33 -0400
Is anyone aware of articles discussing the pros/cons of isolating
business computing from non-business computing.
In other words, if you don't want users accessing certain applications
using the same environment that they use to browse the web, read
email, etc, you might force them through Citrix or give them a VM
appliance and only allow access to sensitive systems via those
mechanisms. I'm looking for articles discussing the general problem as
well as opinions on specific ways to address it.
- application isolation jeff murphy (Oct 29)