Information Security Research Library

Powered by


Effective Web security strategies must extend beyond firewalls, URL filters and malware scanning. User dependence on collaboration beyond email, devices beyond the laptop, and working beyond the borders of the network all put a strain on security. And changes in the threat landscape for 2012 will apply pressure from the other side of the equation. This recording will isolate key aspects of these user/attack shifts and provide an overview of available technologies to deal with them.


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.