constraints. •Implement and enforce security measures to protect end-user devices and data from threats, vulnerabilities
technology solutions to employees and working closely with third party software companies to adopt new
MS-Outlook, Symantec Backup Exec, Symantec EndPoint Protection, Symantec System Recovery, Citrix Go-To-Assist