This resource is no longer available
Applications, Virtualization, and Devices: Taking Back Control
Employees installing and using legitimate but unauthorized applications, such as Instant Messaging, VoIP, games, virtualization software, and unapproved browsers are a real and growing threat to business security and productivity. Removable storage media and wireless protocols make the challenge of securing data even more complex. This paper explains why it is important to control unauthorized applications and devices, discusses the different approaches, and highlights how integrating this functionality into malware protection is the simplest and most cost-effective solution.
- Sophos, Inc.
- 02 Oct 2008
- 23 Sep 2008
- 7 Page(s)
- White Paper