EMAIL THIS ARTICLE
Regaining control
Kelly Martin,

Securing endpoint systems by locking them down using complex software brings back memories of another era, where business computers were once used for business applications only - and businesses retained control over their assets and data.

From (your information):
Name:   Email:
To:
Name:   Email:
Message:
 

Privacy Statement
Copyright 2006, SecurityFocus