Controlling access to IBM Traveler
When a user leaves the company or a device is lost or stolen, you must remove or restrict access to the IBM Traveler server. This section covers methods for removing and restricting access.
When a user leaves the company or a device is lost or stolen, you must remove or restrict access to the IBM Traveler server. This section covers methods for removing and restricting access.