Deperimiterization - Building a Multi-Level Security Strategy to Prevent Infiltration

Registration not required

Executive Summary

With the continued trend toward out-sourcing, growing numbers of hand-held devices to corporate networks, and expansion of third-party business relationships, the traditional view of the network border as a "Hard shell" has been replaced by a porous, more permissive border. The presenter will discuss how IT security departments can manage the challenges that this shift presents through a better understanding of network topology and risk management.

  • Format: Webcast
  • Size: 0 KB