Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Uploaded on Sep 28, 2011
Register for the event now: https://events.unisfair.com/rt/ibm~mm... Companies of all sizes are taking advantage of advances in social media, mobility and cloud based computing, to gain the benefits of increased collaboration, greater flexibility and to lower the cost to grow their business. But how are they addressing the risks? Social media, for example, is increasingly being exploited as the in door for vulnerabilities and threats, as well as the out door for your sensitive information. Mobile devices swarming your IT infrastructure increasingly means that you no longer have visibility into what users and what devices are on your network, let alone whether or not they are in compliance with your established policies. Virtualization and cloud based models for application delivery raise questions about risk and compliance.