残席僅か

What should security operations be like?
How to prevent unauthorized operations in ICT operations and lower the barriers to vulnerability countermeasures

Presented byBOSCO Technologies Inc.

  • Data Leakage Prevention
  • Vulnerability / Tampering Countermeasures
  • Authentication / Identity Management
Speaker

BOSCO Technologies Inc.

close