Interview with Jeff Kukowski, SecureAuth
socalTECH
JULY 28, 2017
That's securing the network, looking at endpoints, and making other security investments across the board, and on such things like mobile device management for mobile phones. We're looking to see if a phone number has been ported recently, or if it's coming from a virtualized network. You might remember Quest Software and Vinny Smith.
Let's personalize your content