This podcast reveals why the users' need to manage endpoints, and what's at stake if they don't. End users can accidentally or intentionally compromise the information on their Blackberries, thumb drives, and laptops. And malware, direct attacks, and phishing scams, can actually threaten their ability to run their business. The security vulnerabilities of cloud computing. The speaker will also explores the emerging trends in cloud security, examining the benefits and limitations of current tools and methods.