Regardless of how a users environment is delivered, it is essential that users receive only the applications they require and cannot introduce unknown executables into the environment. Delivery may be through presentation Virtualization, desktop virtualization, OS and application streaming, personal computer, notebook or any combination of the above.
- Enterprise Application Policy Management
- End Point Analysis
- Application Network Access Control
- Software Licensing Control
- Passive Mode Monitoring
- Integrated Auditing Events