iPhones, iPads and Androids haven’t beaten out the laptops—they’ve joined them. Chances are you are looking for a way to implement total enterprise device management to include smartphones and tablets. Share how you’ll address change among users, devices and applications while preventing security risks.
Currently, there are:
1339 Views | 0 Replies
Share your thoughts with us,
and get involved!
In an office I have to use a proxy. When I connect my laptop I can browse the internet etc fine but when I attempt to use fiberlink to create my VPN session it can't authenticate. How do I configure the proxy in Fiberlink e360 so that it can create the VPN session?