Setting Security Policies for Enterprises With Diverse Endpoints

Setting Security Policies for Enterprises With Diverse Endpoints

Cover

In the past several years, IT administrators have had to cope with an influx of devices, from traditional desktop PCs and laptops to smartphones and tablets. Products exist to help manage bring your own desktop environments, but a strategy and sound policies are at least as important.

Speaker

Dan Sullivan author and systems architect

Dan Sullivan is an author, systems architect, and consultant with over 20 years of IT experience with engagements in advanced analytics, systems architecture, database design, enterprise security and business intelligence. He is a leading provider of expert, third-party content for the IT industry and has written extensively about topics ranging from data warehousing, cloud computing and advanced analytics to security management, collaboration, and text mining.

Vendor:
SearchConsumerization.com
Posted:
25 Sep 2012
Premiered:
26 Sep 2012
Format:
Multimedia
Type:
Virtual Environment
Language:
English
Already a Bitpipe member? Login here

Download this Virtual Environment!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy