article thumbnail

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management. Jackson and Intel’s Yasser Rasheed explore the new normal for security, with a focus on the end users. The new shift here is really making us re-think how we protect the information that we have access to.

article thumbnail

Averting turbulence in the air

CIO Business Intelligence

Understanding the PCI DSS Standard PCI DSS is an information security standard designed to ensure companies that process card payments maintain a secure IT environment for their customers. Data and Information Security The PCI DSS v4.0, PCI DSS v4.0 He is based in So uth Korea.

article thumbnail

How to Choose the Best Vulnerability Scanning Tool for Your Business

Galido

While some of these integrate with Windows products (like Microsoft System Center) and provide intelligent patch management, some others function with mobile device managers. You could use them to scan servers, workstations, network devices, BYOD devices, virtual machines, databases etc.

Tools 84