Endpoint Management: Challenges and Observations

This podcast reveals why the users' need to manage endpoints, and what's at stake if they don't. End users can accidentally or intentionally compromise the information on their Blackberries, thumb drives, and laptops. And malware, direct attacks, and phishing scams, can actually threaten their ability to run their business. The security vulnerabilities of cloud computing. The speaker will also explores the emerging trends in cloud security, examining the benefits and limitations of current tools and methods.

Provided by: Novell Topic: Security Date Added: Jan 2013 Format: Podcast

Find By Topic