1. Keep watch beyond the perimeter
- Author
-
Condon, Ron
- Subjects
Enterprise network ,Company business management ,Virtual private network ,Protocol ,Network configuration management software ,Enterprise networks -- Safety and security measures -- Management -- Usage ,Virtual private networks -- Usage ,Network administrators -- Management -- Usage -- Safety and security measures ,Computer network protocols -- Usage -- Safety and security measures - Abstract
Ron Condoncomputer.weekly@rbi.co.ukIt is easy to see why the IT managers responsible for network security have a hard time increasing their budgets. Business bosses understandably wonder why the money they handed […]
- Published
- 2006