Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack, up from 57 percent just four years ago5
The Soft Underbelly
Note taking and ink annotating
Keyboard centric at the desk, pen and keyboard away from the desk
Keyboard, mouse plus pen, ink, and speech input methods
Use when you want to restrict both win32 applications and ActiveX content
Path Rule
Compares path of file being run to an allowed path list
Use when you have a folder with many files for the same application
Windows XP SP2
Block virus or malicious code at the “point of entry”
Communicate and collaborate in a more secure manner without sacrificing information worker productivity
Staging Architecture
Data entry
Cluster controller