Menu

Encrypted Access: A Double Edged Sword (SSH Communications Security)

  • Wednesday, February 26, 2014 | 3:20 PM – 3:35 PM | South | Room: Expo Briefing Center

View all Sessions

The vast majority of enterprises use Secure Shell encryption to protect high value systems and information. At the same time, security and compliance require strong monitoring, audit and control over all activity involving high value targets. In this presentation you will learn how to use sound management and controls to meet the demands of confidentiality without compromising transparency.

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions/1280/encrypted-access-a-double-edged-sword-ssh on Sun, 29 Mar 2015 22:19:40 -0400.
© 2015 EMC Corporation. All rights reserved.