Posted on
in Presentations
If Secure Remote Access is the logical extension of a private network to another location, and if organizations assume that the ‘other location’ is a WiFi network that is either compromised or malicious, how much protection do enterprise remote access products provide against common threats they could reasonably expect to encounter? This session will present research to inform secure approaches.
Join the RSAC™ Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community