Endpoint Security

Computers and mobile telephony are now so deeply entrenched in the global business and social culture that we have to learn to live with the associated cyber threats, disciplining ourselves and our employees to adopt safe practices and to respond appropriately when a problem arises.

From a corporate point of view, any given device, whether company issued or personal, is likely to contain a mix of personal and corporate information. The BYOD movement exacerbates the corporate security challenge: how do you regulate secure private use of a privately-owned device that exposes the company to data theft and possible network compromise?

For further guidance on security products, visit our information pages.

Alternatively, visit our Security Hardware & Software webshop to see how we can help address your endpoint security. (A good place to start is our pocket guide to Mobile Security.)

 

SAVE 25%
ON AUDITOR
TRAINING