ABSTRACT
This can be facilitated with a standalone device or with an
embedded device that operates independently of the laptop
or PC (firewall PCI card). By keeping the firewall inde-
pendent of the end user you solve the respective manage-
ment issue. You also minimize the impact of
vulnerabilities in the software or OS being taken advantage
of by a hacker on the remote device.