Defenses Should Fit Wired, Wireless Nets

Laptops and mobile devices that access the corporate network behind the perimeter firewall have IT staffs scrambling to combat malicious threats introduced in a way that evades perimeter security measures. As the network perimeter dissolves, IT administrators must find solutions that provide granular access controls and capable zero-day worm defenses that are appropriate and manageable for wired and wireless clients.
Via []

Sorry, comments are closed for this post.