Opinions and Notes at this blog site are Personal , depending upon my relevant experience in the field. These do not necessarily reflect my current and/or previous Employers views.
Also some times information may have been incorporated from publicly available resources including Internet , Experts advise and feedback from end users.
Category Archives: Endpoint Security
In My previous blogs , I have been emphasizing on implementing best practices around endpoint Security Compliance , Password Management, Information Protection and Cloud Security as these are the areas which need absolute attention as per the constantly evolving security … Continue reading
Evolving Endpoint Security Compliance: 7 Keys to Demystify this Chakra-Vyuha (Spiral Ring Formation)
We all know that not only intellectual property, sensitive business information, customer data bases etc reside on the end points; it also includes user’s private information along with deepest darkest (and most valuable) secrets. Moreover we are in the era … Continue reading