Wireless Security: Tools And Techniques To Secure FMC
Click here to view now
Overview: As mobility becomes a key piece of the competitive landscape for enterprises large and small, the security of FMC becomes significant. Tim Olson, CTO of Agito Networks, contends that FMC security requires an end-to-end, multilayer approach, and in this panel discussion he gives concrete examples of the tools and techniques that could make up that approach. He also presents specific examples of implementing FMC security for various applications and for IMS.

