ABSTRACT

This can be facilitated with a standalone device or with an

embedded device that operates independently of the laptop

or PC (firewall PCI card). By keeping the firewall inde-

pendent of the end user you solve the respective manage-

ment issue. You also minimize the impact of

vulnerabilities in the software or OS being taken advantage

of by a hacker on the remote device.