Setting Security Policies for Enterprises With Diverse Endpoints

Setting Security Policies for Enterprises With Diverse Endpoints


In the past several years, IT administrators have had to cope with an influx of devices, from traditional desktop PCs and laptops to smartphones and tablets. Products exist to help manage bring your own desktop environments, but a strategy and sound policies are at least as important.


Dan Sullivan author and systems architect

Dan Sullivan is an author, systems architect, and consultant with over 20 years of IT experience with engagements in advanced analytics, systems architecture, database design, enterprise security and business intelligence. He is a leading provider of expert, third-party content for the IT industry and has written extensively about topics ranging from data warehousing, cloud computing and advanced analytics to security management, collaboration, and text mining.

25 Sep 2012
26 Sep 2012
Virtual Environment
Already a Bitpipe member? Login here

Download this Virtual Environment!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor