Upload

Loading icon Loading...

This video is unavailable.

This video is unlisted. Only those with the link can see it. Social, Mobile and Cloud Security: What the Experts are Saying

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to like MidmarketIBM's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to dislike MidmarketIBM's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to add MidmarketIBM's video to your playlist.

Uploaded on Sep 28, 2011

Register for the event now: https://events.unisfair.com/rt/ibm~mm...
Companies of all sizes are taking advantage of advances in social media, mobility and cloud based computing, to gain the benefits of increased collaboration, greater flexibility and to lower the cost to grow their business. But how are they addressing the risks? Social media, for example, is increasingly being exploited as the in door for vulnerabilities and threats, as well as the out door for your sensitive information. Mobile devices swarming your IT infrastructure increasingly means that you no longer have visibility into what users and what devices are on your network, let alone whether or not they are in compliance with your established policies. Virtualization and cloud based models for application delivery raise questions about risk and compliance.

Loading icon Loading...

Loading icon Loading...

Loading icon Loading...

The interactive transcript could not be loaded.

Loading icon Loading...

Loading icon Loading...

Ratings have been disabled for this video.
Rating is available when the video has been rented.
This feature is not available right now. Please try again later.

Loading icon Loading...

Loading...
Working...
Sign in to add this to Watch Later

Add to