When PCs running the system connect to a network, they can then be identified as legitimate. The attraction for sysadmins is that attackers attempting to access the network using stolen user names and passwords will be refused, despite having legitimate logins.
The company claims to have made trials of the system in the Japanese market, using real-world security environments, and has achieved favourable results.
Downloads and Drivers
From the Forums
Subscribe to TechSpot
Get free exclusive content, learn about new features and breaking tech news.