Abstract

The number and diversity of mobile users, device types and access locations is increasing. It's no longer a question of “whether” to protect data, but “how” to protect data and how to control and manage its security. How does an organization achieve productivity and competitive advantage, while ensuring their data-at-rest remains secure, regardless of the type of user (employees, affiliates, and even customers), the type of computing or removable storage device, or the remote access location (a home, an airport, or Internet cafè)?

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call