Authentication stories - Page 22
Who's listening?
Thu, 1st Jul 2010
#
uc
#
firewalls
#
vpns
Security requirements and strategies apply to unifi ed communications solutions just as much as they do to traditional phone and email systems.
A new era of security
Tue, 1st May 2007
#
firewalls
#
data protection
#
encryption
* NETAPPNot that long ago security discussions were around the network, now the prime focus is on data security.