Introduction - General Services Administration

VMI solutions ideally eliminate on-device storage of enterprise data other than authentication credentials; however, VMI does not mitigate all threats. VMI solutions (like other solutions) are potentially vulnerable to device-based attacks, such as Mobile Remote Access Trojans (MRATs) and network-based attacks, such as Man-in-the-Middle attacks. ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download