![]() Remote Access End Point Control (EPC) verifies that remote users’s computers are secure before allowing network access. These unmanaged computers can easily be infected by keystroke recorders, viruses, Trojan horses, and other hazards that can compromise your network. ![]() Corporate IT departments configure computers under their control with antivirus software, firewalls, and other safeguards designed to protect them from malicious software.īecause SSL VPN solutions can provide network access from any web-enabled device-such as public computers at cafes, airports, or hotels-extra care must be taken to verify that the user’s environment is secure. These VPNs are primarily designed to prevent unauthorized network access, and they typically are not designed to verify that the user’s computer is secure. Traditional VPN solutions typically provide access only from the relative safety of a corporate laptop. This section contains the following subsections: ![]() This section provides an introduction to the Remote Access EPC feature. ![]() The following sections describe the Remote Access End Point Control (EPC) feature:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |