Download now Registration not required
With the continued trend toward out-sourcing, growing numbers of hand-held devices to corporate networks, and expansion of third-party business relationships, the traditional view of the network border as a "Hard shell" has been replaced by a porous, more permissive border. The presenter will discuss how IT security departments can manage the challenges that this shift presents through a better understanding of network topology and risk management.
- Format: Webcast
- Size: 0 KB