Star 0

Abstract

Today's enterprise IT is designed to manage endpoints and networks, and IT users connecting to applications via protected tunnels. It is not easy to scale or change with BYOD, this “stateful” architecture does not offer adequate security to data stored on and accessed by mobile devices. This session discusses how to decouple protection from infrastructure—a stateless architecture.