Encrypted Access: A Double Edged Sword (SSH Communications Security)

  • Wednesday, February 26, 2014 | 3:20 PM – 3:35 PM | South | Room: Expo Briefing Center
View all Sessions

The vast majority of enterprises use Secure Shell encryption to protect high value systems and information. At the same time, security and compliance require strong monitoring, audit and control over all activity involving high value targets. In this presentation you will learn how to use sound management and controls to meet the demands of confidentiality without compromising transparency.

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions/1280/encrypted-access-a-double-edged-sword-ssh on Thu, 27 Nov 2014 09:19:54 -0500.
© 2014 EMC Corporation. All rights reserved.