Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

What is the approach to restrict Data Leakage in the mobile endpoints ( Laptops) , Ipads etc those provided by Corporates to staffs

user-image
Question added by Santhosh Subramaniam Santhanam , Senior Manager - Information Security , Standard Chartered Bank
Date Posted: 2014/05/10
medhat helmy tammam
by medhat helmy tammam , مدير عام المشروعات والورش بمحافظة الأسكندرية , محافظة الأسكندرية

Install laptop close at left on the desk. Action password for laptop. Not to leave the laptop open and works.

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.