As security and compliance regulations require more in-depth information, many organizations are turning their focus from who is accessing to where they are accessing from. Given today’s proliferation of connectivity, this question is not a networking issue, but rather an understanding of a client computer’s statement of health. In this webcast, we discuss real customer examples of how endpoint security is defined and configured on an Intelligent Application Gateway (IAG) solution.
Presenter: Uri Lichtenfeld, Whale-Director, Whale Communications, Inc.
Go to http://msevents.microsoft.com/cui/WebCastEventDetails.aspx?culture=en-US&EventID=1032324178&CountryCode=us to watch this fantastic Webcast.
HTH,
Tom
Thomas W Shinder, M.D., MCSE
Sr. Consultant / Technical Writer
Prowess Consulting www.prowessconsulting.com
PROWESS CONSULTING documentation | integration | virtualization
Email: [email protected]
MVP — Forefront Edge Security (ISA/TMG/IAG)