Share Email Print
cover

Proceedings Paper

End-to-end communications security
Author(s): Kevin J. Kumpf
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

The current methodologies of network communication security and in-transit data security being used within the enterprise do not adequately meet the ever growing threats from internal as well as external sources. A new approach called End-to-End Communications Security is being used to successfully close these security gaps and bring enterprises into regulatory and aduit compliance all at the same time.

Paper Details

Date Published: 18 April 2006
PDF: 7 pages
Proc. SPIE 6241, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006, 62410R (18 April 2006); doi: 10.1117/12.663453
Show Author Affiliations
Kevin J. Kumpf, SSH Communications Security Inc. (United States)


Published in SPIE Proceedings Vol. 6241:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006
Belur V. Dasarathy, Editor(s)

© SPIE. Terms of Use
Back to Top