Kritische Infrastructur: wie verlegen wir den Secure Perimeter in die Cloud?
Zugriffskontrolle in der Cloud? Ist das sicher?
Zugriffskontrolle in der Cloud? Ist das sicher? Jens Hennig und Philip Kriener diskutieren am Lightboard wie man den alten Sicherheitsperimeter von der RZ Grenze in die Cloud verschiebt.
Questions?
Ask Jens:
Thank you! Your message has been sent!
Oops! Something went wrong while submitting the form.
Coming soon!
Related Case Studies
We have been around since 1996. Naturally, we have tremendous experience helping our customers to design, automate, secure and operate their infrastructure, manage their mobile devices or train their key personell. To give you a better idea what we do, we have collected a bunch of stories that best outline our work.
Want to find out more about the products discussed in this video, or other products that from the same solution focus area? Check out other videos or service offerings for this product: