Encrypted Access: A Double Edged Sword (SSH Communications Security)

  • Wednesday, February 26, 2014 | 3:20 PM – 3:35 PM | South | Room: Expo Briefing Center

View all Sessions

The vast majority of enterprises use Secure Shell encryption to protect high value systems and information. At the same time, security and compliance require strong monitoring, audit and control over all activity involving high value targets. In this presentation you will learn how to use sound management and controls to meet the demands of confidentiality without compromising transparency.

This document was retrieved from on Wed, 20 Feb 2019 03:17:34 -0500.