Mar 03, 2013Information technology involves virtual assets and transactions, but security vulnerabilities may lurk in its physical foundations. Jim Caudill, Xterprise's senior VP of marketing and strategy, explains how identifying, tracking and managing risks to physical servers, storage devices and network hardware can help close security gaps that can not be addressed by electronic asset management. This document outlines RFID methods to integrate IT security across physical and virtual domains.
Physical Asset Management and IT Security
SEND IT YOUR WAY
ASK THE EXPERTS
ASK A QUESTION FOR OUR EXPERTS
ASK THE EXPERTS
View previous question answers »