Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

The Ghost Haunting Mobile Enterprise IT Security

December 28, 2010 No Comments

The proliferation of mobile devices in the enterprise — and workers’ tendency to use them for both business and play — takes the teeth out of traditional approaches to network security. “Mobile devices blur the physical and logical boundaries of the enterprise network while multiplying and diversifying the access points to it,” IID’s Lars Harvey explained.

Read More…

Leave a Reply

(required)

(required)


ADVERTISEMENT

DTX ExCeL London

WomeninTech