Two of the more prominent trends in the IT world are the continuing growth of cloud computing and the increasing use of data analytics as a valuable business tool. Both of these areas can play a prominent role in information security efforts—and indeed to some extent they already are, according to recent research reports.
Recent Posts From All Categories
Corporate security leaps ahead with centralized scanning for endpoints, Exchange security, seamless deployment
Securing endpoints has always required balancing context and isolation. Context is about knowing what is happening within an endpoint, while isolation is about the security mechanism being separated from the endpoint that it is protection.