ABSTRACT
A method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy. 2
A method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy. 2