A policy-based approach to network security in which endpoint devices (personal computers, terminals, smart phones, etc.) must comply with specific criteria before being granted access to network resources.
A policy-based approach to network security in which endpoint devices (personal computers, terminals, smart phones, etc.) must comply with specific criteria before being granted access to network resources.