ABSTRACT

A method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy. 2