top of page
NORTON| SYMANTEC | AVG | MCAFEE
This a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints include PCs, laptops, smartphones, tablets and specialized equipment such as bar code readers or point of sale (POS) terminals.
Endpoints
bottom of page