Mechanisms exist to validate software versions/patch levels and control remote devices connecting to corporate networks or storing and accessing organization information.
Mechanisms exist to validate software versions/patch levels and control remote devices connecting to corporate networks or storing and accessing organization information.
Mechanisms exist to provide the capability to expeditiously disconnect or disable a user's remote access session.
Mechanisms exist to control authorized wireless usage and monitor for unauthorized wireless access.
Mechanisms exist to protect wireless access through authentication and strong encryption.
Mechanisms exist to disable unnecessary wireless networking capabilities that are internally embedded within system components prior to issuance to end users.
Mechanisms exist to identify and explicitly authorize users who are allowed to independently configure wireless networking capabilities.
Mechanisms exist to confine wireless communications to organization-controlled boundaries.
Mechanisms exist to test for the presence of Wireless Access Points (WAPs) and identify all authorized and unauthorized WAPs within the facility(ies).
Mechanisms exist to establish trust relationships with other organizations owning, operating, and/or maintaining intranet systems, allowing authorized individuals to: â–ª Access the intranet from external systems; and â–ª Process, store, and/or transmit organization-controlled information using the external systems.
Automated mechanisms exist to implement Data Loss Prevention (DLP) to protect sensitive information as it is stored, transmitted and processed.