Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

What is the approach to restrict Data Leakage in the mobile endpoints ( Laptops) , Ipads etc those provided by Corporates to staffs

user-image
Question added by Santhosh Subramaniam Santhanam , Senior Manager - Information Security , Standard Chartered Bank
Date Posted: 2014/05/10
medhat helmy tammam
by medhat helmy tammam , مدير عام المشروعات والورش بمحافظة الأسكندرية , محافظة الأسكندرية

Install laptop close at left on the desk. Action password for laptop. Not to leave the laptop open and works.

More Questions Like This