UBM: TECH DIGITAL RESOURCE LIBRARY

Wireless Security: Tools And Techniques To Secure FMC

by Interop

Authored on: Jan 13, 2012

Download As mobility becomes a key piece of the competitive landscape for enterprises large and small, the security of FMC becomes significant. Tim Olson, CTO of Agito Networks, contends that FMC security requires an end-to-end, multilayer approach, and in this panel discussion he gives concrete examples of the tools and techniques that could make up that approach. He also presents specific examples of implementing FMC security for various applications and for IMS.


Whitepaper