Host Integrity Check for Endpoint and Network Security

This article gives an introduction to Host Integrity Check mechanism that enables enterprises to enforce the connectivity of their endpoints (Laptops/Desktops) only if they comply to the security policies of the network (Like latest patches, signature updates etc), the components of such a solution, host integrity check for managed, unmanaged and unmanageable endpoints, challenges for deploying host integrity check applications.

Continue reading