Peer-to-peer protection

By on
Peer-to-peer protection

For many organizations, instant messaging (IM) and other peer-to-peer (P2P) applications have become instant headaches.

Sure, IM is a valuable tool that frequently speeds corporate communications and decision-making. But without the proper safeguards and compliance processes in place, P2P software can poke numerous security holes in a corporate network. Indeed, more than 2,400 software security threats ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?