Video Screencast Help
Vision User Conference Blog

Applications & Data Security

Created: 17 Apr 2013 • Updated: 19 May 2014
CLEO in Control's picture
0 0 Votes
Login to vote

Most successful cyber attacks and exploits can be traced back to poor application security. Applications and the data they use are among the weakest cyber security links for enterprises. Today, applications and data reside inside and outside enterprise data centers and are deployed on many platforms and devices, including mobile devices.

Join me today at 2:30 pm in room 116 as HP and Symantec senior technologists share insights and steps you can take to understand and address these risks and costs in your enterprise.