top of page

This a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints include PCs, laptops, smartphonestablets and specialized equipment such as bar code readers or point of sale (POS) terminals.

Endpoints

bottom of page