Download this episode
Suppose we engage a vendor in a proof of concept. It's for anti-spam, perhaps, or for intrusion detection. We put it in-line with our existing solution. And, shock! It finds something risky. Always. Why is this?
Available formats for this video:
Actual format may change based on video formats available and browser capability.