This resource is no longer available

Applications, Virtualization, and Devices: Taking Back Control

Cover
Employees installing and using legitimate but unauthorized applications, such as Instant Messaging, VoIP, games, virtualization software, and unapproved browsers are a real and growing threat to business security and productivity. Removable storage media and wireless protocols make the challenge of securing data even more complex. This paper explains why it is important to control unauthorized applications and devices, discusses the different approaches, and highlights how integrating this functionality into malware protection is the simplest and most cost-effective solution.
Vendor:
Sophos, Inc.
Posted:
02 Oct 2008
Published
23 Sep 2008
Format:
PDF
Length:
7 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.